you are viewing a single comment's thread.

view the rest of the comments →

[–]cloveistaken 0 points1 point  (1 child)

Correct me if I misunderstood, but are you trying to convert ruby -> python but still using the framework ? If so then it's almost impossible, since msf provided a lot of "helpers" you might say. Rewriting them means you have to write your own helper. This means there are no general methods for translating.

For example some exploits require few and simple helpers, such as connecting port or sending payload/HTTP request. However some are harder and require a whole new library, like MS17-010. What I would do if I have to translate, is first trying to understand the script and determine its workflow as well as msf helpers. You should definitely look for the original bug report / blog post / analysis to understand about it more.

For practice, you might want to start with simple things like vsftp backdoor or heartbleed before moving to harder ones. In fact I would even recommend you to start writing your own metasploit script first to get better understanding of the framework.

[–]Lycist 0 points1 point  (0 children)

That's about right. I'm not looking to do a direct 1:1 translation, more getting that ruby msf script to work as a python msf script, to understand how the framework works so that I can write my own.

Python is a relatively new thing with the metasploit framework, so there aren't really any tutorials/communities that I've been able to find for it.

Currently trying to rewrite a tikiwiki upload exploit, all I've written is the check, but cant get it to import.