In this chapter, we discussed the web interface of MSF. We started off by installing Metasploit and setting up its configuration. Then, we moved on and discussed modules, such as creating a project and importing a scan result from a different tool. After that, we looked at auxiliaries and exploits before learning about the post-exploitation modules that are available in the Metasploit web interface.
In the next chapter, we'll learn how to use Metasploit to perform recon on different types of targets, protocols, and ports.