welcome back to are Metasploit section of hacking a rise so in this one im gaving a shot example of the module’s so lets start
so there are six types of modules in metasploit
exploit
payloads
auxiliary
encoders
post
nops
EXPLOIT
Well it is what it is this module has pre-installed scripts to help you take advantage or own a system not much to say on this as its explains its self
PAYLOADS
theses are what u install on the targets system there many types of payloads but wont get in to that now payloads a re use to connect the target system to the attacker these are known as listeners or in rare cases root kits the strongest payload is a meterpreter it leaves no trace in the system
AUXILIARY
this is for such things as dos,fuzzers,sniffers,scanners
ENCODERS
This is to re-code your payload to bypass AV and IDS
POST EXPLOITATION
post is to use after the attack on the targets system this modules included things such as key loggers , privilege escalation turn on webcams,mics
NOP
well nop is short for no operation it is often used after a buffer flow attack to run remote code.
to see what options u have use the show command e.g show payloads
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.