From the course: Penetration Testing with Metasploit
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Overview and architecture - Metasploit Tutorial
From the course: Penetration Testing with Metasploit
Overview and architecture
- [Instructor] In this module, we would mainly focus on understanding various aspects of Metasploit, its architecture, components, features, advantage and limitations. The first thing we need to know that Metasploit is neither a routine tool, nor a common software. It is a framework that you can use off the shelf or use as a base build to build your own exploits and test scenarios. As we will discuss in the coming sections, it supports most phases of a penetration testing exercise. Given that it integrates with most of the third-party tools that we might have in our arsenal, like Nmap, Acunetix, Nieces, et cetera, the advantage of Metasploit cannot be understated. Lastly, we should note that Metasploit is not the only framework that we can use. We can just as easily use Cobalt Strike, Exploit Back, or publicly available exploits. It is just that Metasploit is the most widely used one. Plus, the open source component makes…