The best way to learn the structure of Metasploit is to browse through its directory. When using a Kali Linux, the Metasploit Framework is usually located at path /usr/share/metasploit-framework, as shown in the following screenshot:
![](https://static.packt-cdn.com/products/9781788295970/graphics/assets/e1df3cb0-4aa4-47c8-901b-947adb1143f2.jpg)
At a broad level, the Metasploit Framework structure is as shown in the following screenshot:
![](https://static.packt-cdn.com/products/9781788295970/graphics/assets/b7506917-314b-4c3c-8e0e-ac7e24d445dc.jpg)
The Metasploit Framework has a very clear and well-defined structure, and the tools/utilities within the framework are organized based on their relevance in various phases of the penetration testing life cycle. We'll be using tools/utilities from each of these categories as we progress through the book.
In the next section, we'll have a brief overview of all the Metasploit components.