- Metasploit Bootcamp
- Nipun Jaswal
- 124字
- 2021-07-09 21:00:02
Architecture of Metasploit
Metasploit comprises various components, such as extensive libraries, modules, plugins, and tools. A diagrammatic view of the structure of Metasploit is as follows:

Let's see what these components are and how they work. It is best to start with the libraries that act as the heart of Metasploit.
Let's understand the use of various libraries, as explained in the following table:

We have many types of modules in Metasploit, and they differ regarding their functionality. We have payload modules for creating access channels to exploited systems. We have auxiliary modules to carry out operations such as information gathering, fingerprinting, fuzzing an application, and logging into various services. Let's examine the basic functionality of these modules, as shown in the following table:

- 黑客攻防技巧
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實錄
- 計算機病毒分析與防范大全(第3版)
- 工業(yè)物聯(lián)網(wǎng)安全
- 計算機網(wǎng)絡(luò)安全技術(shù)研究
- 學(xué)電腦安全與病毒防范
- 情報驅(qū)動應(yīng)急響應(yīng)
- Web安全之深度學(xué)習(xí)實戰(zhàn)
- 互聯(lián)網(wǎng)企業(yè)安全高級指南
- 黑客攻防實戰(zhàn)從入門到精通
- 華為Anti-DDoS技術(shù)漫談
- 交換機·路由器·防火墻(第2版)
- 黑客攻擊與防范實戰(zhàn)從入門到精通
- 網(wǎng)絡(luò)空間安全法律問題研究
- 信息系統(tǒng)安全等級化保護原理與實踐