Writing your own Metasploit module
As mentioned earlier, a white hat hacker should know how to write their own tools and scripts. So, let's see how to create a simple Metasploit module. In this demonstration, we'll use Ruby as a programming language, and we'll build a TCP scanner.
First, create a Ruby file:
require 'msf/core' class Metasploit3 <Msf::Auxiliary include Msf::Exploit::Remote::Tcp include Msf::Auxiliary::Scanner def intialize super( 'Name' => 'TCP scanner', 'Version' => '$Revisiov: 1 $', 'Description' => 'This is a Demo for Packt Readers', 'License' => MSF_LICENSSE ) register_options([ opt::RPORT(3000) ], self.class) end def run_host(ip) connect() greeting = "Hello Cybrary" sock.puts(greeting) data = sock.recv(1024) print_status("Received: #{data} from #{ip}") end end
To test the response, create a text file named server.txt
, and set up a netcat listener. Now, save it at usr/share/metasploit-framework/modules/auxiliary/scanner
:
nc -lnvp 3000 < server.txt

Open Metasploit...