Chapter 7. Working with Modules for Penetration Testing

In this chapter, we will cover:

  • Working with scanner auxiliary modules
  • Working with auxiliary admin modules
  • SQL injection and DOS attack modules
  • Post-exploitation modules
  • Understanding the basics of module building
  • Analyzing an existing module
  • Building your own post-exploitation module

Introduction

In the first chapter where we discussed about the Metasploit framework basics, we stated that it has a modular architecture. This means that all the exploits, payloads, encoders, and so on are present in the form of modules. Modular architecture makes it easier to extend the functionality of the framework. Any programmer can develop his/her own module and port it easily into the framework. A complete penetration ...

Get Metasploit Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.