O'Reilly logo

Metasploit Penetration Testing Cookbook - Second Edition by Abhinav Singh, Monika Agarwal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Analyzing an existing module

Now that we have built some background about module building in our previous recipe, our next step will be to analyze existing modules. It is highly recommended that you look at the scripts of existing modules if you have to learn and dive deeper into module and platform development.

Getting ready

We will analyze a simple FTP module here in order to dive deeper into module building.

We will proceed from where we left off in the previous recipe. We have already discussed the basic template of the module in the previous recipe, so here we will start from the main body of the script.

How to do it...

We will be analyzing the FTP anonymous access module in the following steps:

  1. We can find the main script at the following location ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required