Sometimes you might want to have a stand alone exploit, but the only option out there is a Metasploit module. Sure you could always just fire up Metasploit and use it… but what fun would that be? Besides it’s great to understand what’s going on under the hood of the Metasploit modules for both getting a handle on writing your own exploits and in the future even writing your own Metasploit modules and contributing back to the fantastic project.
Requirements
- Windows XP – SP3 Virtual Machine (Victim).
- Kali Linux Virtual Machine (Attacker).
- Allied Telesyn TFTP Server 1.9 (Available here).
- A willingness to give things a go.