In this chapter, we looked at the Metasploit Framework. We defined what it can be used for and explored the various types of modules included. We worked on some of the initial tasks of Metasploit and looked at where we can obtain new modules. Using the flexibility of Metasploit, we imported data from other sources such as Nmap and Nessus and explored the core components of Metasploit. Lastly, we looked at using MSFvenom in the creation of shellcode.
You now have the ability to perform the initial configuration of the Metasploit Framework. You have learned how to perform some initial setup tasks such as updating the Metasploit Framework and linking it to a database. You have gained skills on how to enhance your experience within the Metasploit Framework by using workspaces and importing data from tools such as Nmap and Nessus. You have learned where to obtain new modules...