Metasploit Types
The Type
tag is the first level of segregation between the Metasploit modules
. Looking at this field, we can tell what the piece of code for this module will accomplish. Some of these types
are not directly usable as an exploit
module would be, for example. However, they are set to introduce the structure alongside the interactable ones for better modularization. To explain better, here are the possible types that could appear in this field:
Type
Description
Auxiliary
Scanning, fuzzing, sniffing, and admin capabilities. Offer extra assistance and functionality.
Encoders
Ensure that payloads are intact to their destination.
Exploits
Defined as modules that exploit a vulnerability that will allow for the payload delivery.
NOPs
(No Operation code) Keep the payload sizes consistent across exploit attempts.
Payloads
Code runs remotely and calls back to the attacker machine to establish a connection (or shell).
Plugins
Additional scripts can be integrated within an assessment with msfconsole
and coexist.
Post
Wide array of modules to gather information, pivot deeper, etc.
Last updated