Metasploit modules
metasploit modules
- Exploits
a sequence of commands used to target a specific vulnerability in a target system.
- Payloads
malicious code that allows access to and runs in the target system after a vulnerability is exploited, including connecting to the target.
- Auxiliary
used to perform actions outside a payload, not always directly related to exploitation, such as DoS attacks or scanners.
- Post-exploitation
a module that allows you to gain access or more information on the exploited system.
- NOPs
a generator that is used to bypass standard IDS and IPS NOP sled signatures.