Introduction

So far, we have used exploits to compromise targets without knowing how they work. Although all the exploit modules are thoroughly verified, it is always good to understand how they are built. As a penetration tester, knowing how to write your own module, or simply adding a new target to an existing module, is a great skill to have.

This chapter will cover every detail that you need to know while working with exploits within the framework. We will not cover exploit development, an entire area of study in itself; we will use the available proof of concept (PoC) of exploits and see how they can be added to the framework. We will also learn about some important mixins that can ease the process of converting exploits into the Metasploit ...

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.