Metasploit
Metasploit Framework is an Open Source framework used for exploitation and post exploitation of networks usually during a Network Penetration Testing. It has various components like:
Workspace :
Workspace in Metasploit Framework is a container for the data used and collected during a penetration testing.
Task :
Task in any action that is performed in Metasploit. It can be running an exploit or running an auxiliary.
Module :
Many tasks performed in Metasploit requires the use of a module which is a standalone software that extends the functionality of Metasploit Framework. A module can be exploit, auxiliary or post-exploitation module.
Exploit Module :
An exploit module performs a sequence of commands on a target for a specific vulnerability. An exploit module is built to take advantage of the vulnerability found in the target system to provide access to the system.
Auxiliary Module :
An auxiliary module is used to perform arbitrary actions which are not related to exploitation and do not execute a payload. Examples: checking if the system is vulnerable to a particular exploit, scanning, Denial of Service attacks.
Post-Exploitation Module :
A post-exploitation module allows to gain further access to an exploited target system or gain more knowledge about it. Example: hash dump
Payload :
Payload is a code that run after a system is exploited. It defines how you want to connect to the shell of the system and what to do with it after taking over control. A payload normally opens a Meterpreter or command shell.
Database :
The database stores host data, system logs, collected evidence, and report data.
Exploit :
An exploit is a program or code which provides access to the target system after taking advantage of a specific vulnerability that exists on the target system. An exploit carries a payload and delivers it to a target.
Listener :
Listener will wait for an incoming connection from an exploited target system or attacker machine and manage the connection after receiving it.
Meterpreter :
Meterpreter uses an advance multi-functional payload which provides an interactive shell with the exploited target system. From a Meterpreter shell, we can do many things like download password hashes for user accounts on the system, perform privilege escalation and other similar things.
Vulnerability :
A Vulnerability is a flaw or weakness in a system that enables an attacker to compromise the target system.