![Mastering Metasploit](https://wfqqreader-1252317822.image.myqcloud.com/cover/870/36699870/b_36699870.jpg)
上QQ阅读APP看书,第一时间看更新
Understanding the file structure
File structure in Metasploit is laid out in the scheme shown in the following figure:
![](https://epubservercos.yuewen.com/3A9801/19470393408885606/epubprivate/OEBPS/Images/Chapter_12.jpg?sign=1738978371-Th1H4ER0L0tEpFRuGcCqylEI32p2Jhfh-0-6a38a2015a0fdcb6c46f693c22329bc7)
We will cover the most relevant directories, which will aid us in building modules for Metasploit, through the following table:
![](https://epubservercos.yuewen.com/3A9801/19470393408885606/epubprivate/OEBPS/Images/006.jpg?sign=1738978371-QiU6RVuD6dDw47ymC2eVVscJpCh5KPOK-0-f9289423bb519b0d47968a0519facd7e)