![Mastering Metasploit](https://wfqqreader-1252317822.image.myqcloud.com/cover/870/36699870/b_36699870.jpg)
上QQ阅读APP看书,第一时间看更新
Understanding the file structure
File structure in Metasploit is laid out in the scheme shown in the following figure:
![](https://epubservercos.yuewen.com/3A9801/19470393408885606/epubprivate/OEBPS/Images/Chapter_12.jpg?sign=1739548389-7pPzzQwIaDZfluseumOkf4DA4ymmwcYT-0-7c4a962e574ed351eff04ee90db78d79)
We will cover the most relevant directories, which will aid us in building modules for Metasploit, through the following table:
![](https://epubservercos.yuewen.com/3A9801/19470393408885606/epubprivate/OEBPS/Images/006.jpg?sign=1739548389-WZB1SzhWbwyYZutYDqWHrhAgl3YuINR3-0-19af499663e69e17d2c2fcf0c381e4a3)