Jayamohan Ass 1
Jayamohan Ass 1
Metasploit tool
1. Exploits:
Exploits in Metasploit are modules that take advantage of vulnerabilities
in target systems. They are essentially pieces of code designed to
leverage weaknesses in software or system configurations to gain
unauthorized access or control over a target machine. Exploits are
categorized based on the vulnerabilities they target, such as remote
code execution, privilege escalation, or buffer overflows.
Exploits may come in various forms, including remote exploits that
target services running on remote systems, client-side exploits that
target vulnerabilities in client applications like web browsers or email
clients, and local exploits that target vulnerabilities in locally accessible
software or configurations.
2. Auxiliary:
3. Payloads:
4. Post-exploitation:
6. Encoders:
7. Evasion:
Evasion modules in Metasploit are designed to bypass security measures
such as firewalls, intrusion detection systems (IDS), or antivirus software.
They utilize various techniques to evade detection, including payload
obfuscation, traffic encryption, fragmentation, and protocol
manipulation. Evasion techniques aim to make exploits and payloads
more stealthy and difficult to detect by security defenses.