Modules and Locations

  • Primary Modules: /usr/share/metasploit-framework/modules/

  • Custom Modules: ~/.msf4/modules/

root@kali:~# ls /usr/share/metasploit-framework/modules/
auxiliary  encoders  exploits  nops  payloads  post

Exploits

  • Exploit modules are defined as modules that use payloads.

root@kali:~# ls /usr/share/metasploit-framework/modules/exploits/
aix        bsdi        firefox  irix       multi    solaris
android    dialup      freebsd  linux      netware  unix
apple_ios  example.rb  hpux     mainframe  osx      windows

Auxiliary

  • Auxiliary modules include port scanners, fuzzers, sniffers, and more.

root@kali:~# ls /usr/share/metasploit-framework/modules/auxiliary/
admin    client   dos         gather  scanner  spoof  vsploit
analyze  crawler  example.rb  parser  server   sqli
bnat     docx     fuzzers     pdf     sniffer  voip

Payloads, Encoders, Nops

  • Payloads consist of code that runs remotely.

  • Encoders ensure that payloads make it to their destination intact.

  • Nops keep the payload sizes consistent across exploit attempts.

Loading Additional Module Trees

  • Pass the -m option when running msfconsole to load additional modules at runtime.

  • Use the loadpath command, If you need to load additional modules after msfconsole being started.

References

Last updated