- Metasploit Bootcamp
- Nipun Jaswal
- 124字
- 2021-07-09 21:00:02
Architecture of Metasploit
Metasploit comprises various components, such as extensive libraries, modules, plugins, and tools. A diagrammatic view of the structure of Metasploit is as follows:

Let's see what these components are and how they work. It is best to start with the libraries that act as the heart of Metasploit.
Let's understand the use of various libraries, as explained in the following table:

We have many types of modules in Metasploit, and they differ regarding their functionality. We have payload modules for creating access channels to exploited systems. We have auxiliary modules to carry out operations such as information gathering, fingerprinting, fuzzing an application, and logging into various services. Let's examine the basic functionality of these modules, as shown in the following table:

- INSTANT Burp Suite Starter
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- 反黑命令與攻防從新手到高手(微課超值版)
- 軟件開發(fā)安全之道:概念、設(shè)計(jì)與實(shí)施
- 網(wǎng)絡(luò)安全技術(shù)與實(shí)訓(xùn)(第4版)(微課版)
- 數(shù)據(jù)安全領(lǐng)域指南
- CTF那些事兒
- 華為防火墻實(shí)戰(zhàn)指南
- INSTANT Apple Configurator How-to
- VMware vCloud Security
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- Practical Internet of Things Security
- Practical Mobile Forensics
- 網(wǎng)絡(luò)入侵檢測(cè)系統(tǒng)原理與應(yīng)用
- Hands-On Bug Hunting for Penetration Testers