![Mastering Metasploit](https://wfqqreader-1252317822.image.myqcloud.com/cover/870/36699870/b_36699870.jpg)
上QQ阅读APP看书,第一时间看更新
Understanding the file structure
File structure in Metasploit is laid out in the scheme shown in the following figure:
![](https://epubservercos.yuewen.com/3A9801/19470393408885606/epubprivate/OEBPS/Images/Chapter_12.jpg?sign=1739353497-nbJPHuudofezwZz0AOwabSlfgEzJmAar-0-d93308ea0df0d11d95077c169d6096fa)
We will cover the most relevant directories, which will aid us in building modules for Metasploit, through the following table:
![](https://epubservercos.yuewen.com/3A9801/19470393408885606/epubprivate/OEBPS/Images/006.jpg?sign=1739353497-t1FeQRxNapRrFjYJDiVXQ27NjLyyXpVT-0-bf69daf7ef6e6e939d2870f78506b9cd)