Metasploit

Metasploit Framework is an Open Source framework used for exploitation and post exploitation of networks usually during a Network Penetration Testing. It has various components like:

Workspace :

Workspace in Metasploit Framework is a container for the data used and collected during a penetration testing.

Task :

Task in any action that is performed in Metasploit. It can be running an exploit or running an auxiliary.

Module :

Many tasks performed in Metasploit requires the use of a module which is a standalone software that extends the functionality of Metasploit Framework. A module can be exploit, auxiliary or post-exploitation module.

Exploit Module :

An exploit module performs a sequence of commands on a target for a specific vulnerability. An exploit module is built to take advantage of the vulnerability found in the target system to provide access to the system.

Auxiliary Module :

An auxiliary module is used to perform arbitrary actions which are not related to exploitation and do not execute a payload. Examples: checking if the system is vulnerable to a particular exploit, scanning, Denial of Service attacks.

Post-Exploitation Module :

A post-exploitation module allows to gain further access to an exploited target system or gain more knowledge about it. Example: hash dump

Payload :

Payload is a code that run after a system is exploited. It defines how you want to connect to the shell of the system and what to do with it after taking over control. A payload normally opens a Meterpreter or command shell.

Database :

The database stores host data, system logs, collected evidence, and report data.

Exploit :

An exploit is a program or code which provides access to the target system after taking advantage of a specific vulnerability that exists on the target system. An exploit carries a payload and delivers it to a target.

Listener :

Listener will wait for an incoming connection from an exploited target system or attacker machine and manage the connection after receiving it.

Meterpreter :

Meterpreter uses an advance multi-functional payload which provides an interactive shell with the exploited target system. From a Meterpreter shell, we can do many things like download password hashes for user accounts on the system, perform privilege escalation and other similar things.

Vulnerability :

A Vulnerability is a flaw or weakness in a system that enables an attacker to compromise the target system.