Modules and Locations
Primary Modules: /usr/share/metasploit-framework/modules/
Custom Modules: ~/.msf4/modules/
root@kali:~# ls /usr/share/metasploit-framework/modules/
auxiliary encoders exploits nops payloads postExploits
Exploit modules are defined as modules that use payloads.
root@kali:~# ls /usr/share/metasploit-framework/modules/exploits/
aix bsdi firefox irix multi solaris
android dialup freebsd linux netware unix
apple_ios example.rb hpux mainframe osx windowsAuxiliary
Auxiliary modules include port scanners, fuzzers, sniffers, and more.
root@kali:~# ls /usr/share/metasploit-framework/modules/auxiliary/
admin client dos gather scanner spoof vsploit
analyze crawler example.rb parser server sqli
bnat docx fuzzers pdf sniffer voipPayloads, Encoders, Nops
Payloads consist of code that runs remotely.
Encoders ensure that payloads make it to their destination intact.
Nops keep the payload sizes consistent across exploit attempts.
Loading Additional Module Trees
Pass the -m option when running msfconsole to load additional modules at runtime.
Use the loadpath command, If you need to load additional modules after msfconsole being started.
References
Last updated