metasploit modules

Metasploit Modules Explained | Lesson 3

Introduction

In this post, You will learn what is Modules in Metasploit and you will learn the different types of Modules.

If you haven’t read Lesson 1 and Lesson 2 of Metasploit [click here]

Video

Metasploit Modules

There are 7 Modules in Metasploit they are;

auxiliary
encoders
evasion/windows
exploit
nops
payloads
post

To see the branch of Metasploit Modules [click here]

Modules are the important sections and most of the time you will be spending time in modules only.

You can find the Metasploit Modules in this location  /usr/share/metasploit-framework/modules/ 

root@kali:~# ls /usr/share/metasploit-framework/modules/
auxiliary  encoders  exploits  nops  payloads  post
Metasploit Modules
Metasploit Modules

Auxilary Module

The Auxiliary modules include port scanners, fuzzers, sniffers, parser, server, admin access and much more.

root@kali:~# ls /usr/share/metasploit-framework/modules/auxiliary/
admin    client   dos         gather  scanner  spoof  vsploit
analyze  crawler  example.rb  parser  server   sqli
bnat     docx     fuzzers     pdf     sniffer  voip

Encoders

Encoders make sure the payloads make it to their destination. Here we can find the languages and much more.

root@kali:~# ls /usr/share/metasploit-framework/modules/encoders/
cmd  generic  mipsbe  mipsle  php  ppc  ruby  sparc  x64  x86

evasion/windows

The evasion/windows directory is recently added to the Modules, Here we can find the modules to evade the windows system.

┌──(root????osboxes)-[/usr/…/metasploit-framework/modules/evasion/windows]
└─# ls
applocker_evasion_install_util.rb      applocker_evasion_regasm_regsvcs.rb     windows_defender_exe.rb
applocker_evasion_msbuild.rb           applocker_evasion_workflow_compiler.rb  windows_defender_js_hta.rb
applocker_evasion_presentationhost.rb  process_herpaderping.rb

Exploit

Exploits are nothing but which use the payloads and exploit the target.

root@kali:~# ls /usr/share/metasploit-framework/modules/exploits/
aix        bsdi        firefox  irix       multi    solaris
android    dialup      freebsd  linux      netware  unix
apple_ios  example.rb  hpux     mainframe  osx      windows

Nops

The Nops Modules keep the size of the payload at the same size throughout the exploitation.

root@kali:~# ls /usr/share/metasploit-framework/modules/nops/
aarch64  armle  mipsbe  php  ppc  sparc  tty  x64  x86

Payloads

The payloads are consist of codes that run remotely.

root@kali:~# ls /usr/share/metasploit-framework/modules/payloads/
singles  stagers  stages

Post

The Post modules contain Post exploitation modules that can be used on compromised targets.

┌──(root????osboxes)-[/usr/share/metasploit-framework/modules/post]
└─# ls
aix  android  apple_ios  bsd  firefox  hardware  linux  multi  networking  osx  solaris  windows

Conclusion

In the next lesson let’s learn about the Metasploit fundamentals. This is just the basics of Metasploit Modules. Let’s dive deeper into Metasploit modules in later Lessons.

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions or brave browser to block ads. Please support us by disabling these ads blocker.Our website is made possible by displaying Ads hope you whitelist our site. We use very minimal Ads in our site

 

Scroll to Top