![]() Auxiliary functions are the supplementary tools and commands used to perform different penetration testing tasks, such as scanning, fuzzing, sniffing, etc. Listeners are used to establishing a connection between the host and target machines. The encoders play the role of code scramblers. The exploits are the tools used to take over the target machines by exploiting the vulnerabilities. The staged payloads consist of a stub-loader that recalls the host machine to send the final piece of payload when (the sub-loader is) executed on the target machine. The single payloads are the complete lightweight malicious codes shared with the target machines. These payloads can be classified as ‘single’ and ‘staged’ payloads. Metasploit has a number of payloads for different scenarios. ![]() ![]() The core modules are divided into the following categories All these features can be combined into a set of modules. Metasploit framework is an open-source security project that offers multiple penetration testing and exploits development features.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |