How to do it...

Post modules are categorized based on their behavior, as shown in the following list from the official documentation:

Category

Description

gather

Modules that involve data gathering/collecting/enumeration.

gather/credentials

Modules that steal credentials.

gather/forensics

Modules that involve forensics data gathering.

manage

Modules that modify/operate/manipulate something on the system. Session management-related tasks such as migration, injection also go here.

recon

Modules that will help you learn more about the system in terms of reconnaissance, but not about data stealing. Understand that this is not the same as gather type modules.

wlan

Modules that are for WLAN related tasks. ...

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.