Developing a New Metasploit Scanner

# Introduction In this lab, we will revisit the module structure and functional analysis of Metasploit, and then focus on introducing scanners. You will learn how to develop your own Metasploit scanner. This lab is a hands-on tutorial. To help you understand some operations, we will include some information security theory and recommend valuable articles for you to read, allowing you to solidify your theoretical foundation while practicing.

|60 : 00

Click the virtual machine below to start practicing