×
  • Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

Metasploit - The Exploit Learning Tree

by on Nov 23, 2013

  • 2,421 views

The purpose of this document ...

The purpose of this document
is not to show how to use Metasploit tool there are enormous amount of sources available to do that but to show you how to look deeper into the code and try to decipher how the various classes and modules hang
together to produce the various functions we love to use.
In doing so we will learn how the exploit framework could be structured, how the interaction between the
attacker and the exploited vulnerability could be
achieved and how the user can extend the functionality of Metasploit.

Statistics

Views

Total Views
2,421
Views on SlideShare
752
Embed Views
1,669

Actions

Likes
0
Downloads
56
Comments
0

20 Embeds 1,669

http://www.ehacking.net 1435
http://feeds.feedburner.com 144
http://cloud.feedly.com 31
http://feedly.com 15
http://3964176871415674890_b6e66405d102674d2bc047628ad4d652252bde5d.blogspot.com 9
http://www.feedspot.com 9
http://plus.url.google.com 9
http://192.168.1.12 3
http://feedreader.com 2
http://192.168.1.44 2
http://ethical240.rssing.com 1
http://translate.googleusercontent.com 1
http://192.168.2.134 1
http://192.168.178.22 1
http://silverreader.com 1
http://home.ae3c.fr 1
http://127.0.0.1 1
http://feedproxy.google.com 1
http://www.newsblur.com 1
http://inoreader.com 1
More...

Accessibility

Upload Details

Uploaded via SlideShare as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
Post Comment
Edit your comment

Metasploit - The Exploit Learning Tree Metasploit - The Exploit Learning Tree Document Transcript