Now that we have accumulated some background about module building in our previous recipe, our next step will be to analyze existing modules.
Analyzing an existing module
Getting ready
We will analyze a Windows Powershell Execution Post Module in order to delve more deeply into module building.
We will proceed from where we left off in the previous recipe. We have already discussed the basic template of the module in the previous recipe, so here we will start from the main body of the script.
We can find the Windows Powershell Execution Post Module at the following location:
/usr/share/metasploit-framework/modules/post/windows/manage/exec_powershell.rb