![Mastering Metasploit](https://wfqqreader-1252317822.image.myqcloud.com/cover/870/36699870/b_36699870.jpg)
上QQ阅读APP看书,第一时间看更新
Understanding the file structure
File structure in Metasploit is laid out in the scheme shown in the following figure:
![](https://epubservercos.yuewen.com/3A9801/19470393408885606/epubprivate/OEBPS/Images/Chapter_12.jpg?sign=1739295536-QFjqyjnGWWJnRrPNYFFTzAYpp3QpHyXy-0-0d3455303ff2788fa8d5b166ddd6f6bf)
We will cover the most relevant directories, which will aid us in building modules for Metasploit, through the following table:
![](https://epubservercos.yuewen.com/3A9801/19470393408885606/epubprivate/OEBPS/Images/006.jpg?sign=1739295536-d0qOgDv3f6Gug0ozHdQqiBf2Qn3zRV96-0-7f1c487d144ea96119a9558db4a2429b)