Chapter 7. Working with Modules for Penetration Testing
In this chapter, we will cover:
Working with scanner auxiliary modules
Working with auxiliary admin modules
SQL injection and DOS attack modules
Post-exploitation modules
Understanding the basics of module building
Analyzing an existing module
Building your own post-exploitation module