本程序是在《Metasoloit pentration tester user guide》p31的程序做来一定的修改,原书程序在BT5下无法运行。报“metasploit_the_pentration_tester_guide”,经过与

/opt/framework3/msf3/modules/auxiliary/scanner/http/open_proxy.rb 的程序进行对比后修改而成。
 

 

#Metasploit
require 'msf/core'

class Metasploit3 < Msf::Auxiliary

        include Msf::Exploit::Remote::Tcp
        include Msf::Auxiliary::Scanner

        def initialize(info = {})
                super(update_info(info,
                        'Name'          => 'My custom TCP scan',
                        'Version'       => '$Revision:1 $',
                        'Description'   => 'My quick scanner',
                        'Author'        => 'Metazhou',
                        'License'       => MSF_LICENSE
                ))

                register_options(
                        [
                                Opt::RPORT(12345)
                        ],self.class)
        end

        def run_host(ip)
                        connect()
                        sock.puts('HELLO SERVER')
                        data = sock.recv(1024)
                        print_status("Received: #{data} from #{ip}")
                        disconnect()
        end
end