Importing TCP server/browser-based exploits into Metasploit
During an application test or a penetration test, we might encounter software that may fail to parse data from a request/response and end up crashing. Let's see an example of an application that has a vulnerability when parsing data:
Figure 4.12 – Using a Python exploit on BS Player
The application used in this example is BSplayer 2.68. The vulnerability lies in parsing the remote server's response when a user tries to play a video from a URL.
When we try to stream content from the listener port of the exploit, which is 12000, the application crashes, and instead the calculator pops up, denoting the successful exploitation of the application.
Note
Download the Python exploit for BSplayer 2.68 from https://www.exploit-db.com/exploits/36477/.
Let's see the exploit code and gather essential information from it to build the Metasploit module:
Figure...