In this chapter, we covered coding for Metasploit. We worked on modules, post-exploitation scripts, Meterpreter, RailGun, and Ruby programming too. Throughout this chapter, we saw how we could add our custom functions to the Metasploit framework, and make the already powerful framework much more powerful. We began with familiarizing ourselves with the basics of Ruby. We learned about writing auxiliary modules, post-exploitation scripts, and Meterpreter extensions. We saw how we could make use of RailGun to add custom functions, such as adding a DLL file and a custom function to the target's DLL files.
For additional learning, you can try the following exercises:
- Create an authentication brute force module for FTP
- Work on at least three post-exploitation modules each for windows, Linux, and macOS, which are not yet a part of Metasploit
- Work on RailGun...