cyber security
exploitation
metasploit
Exploit: contains the exploit code
Payload: contains the shell code used after exploit compromises a system
Encoder: allows us to modify the appearance of our exploit in order to avoid signature detection
NOP: used with buffer overflow and ROP attacks. A NOP generator produces a series of random bytes that can be used to bypass standard IDS and IPS NOP sled signatures.
Auxiliary: performs arbitrary actions not directly related to exploitation e.g Scanning, fuzzing, and DOS attacks. Usually used to scan and verify that machines are exploitable.
Post: used for looting and pivoting.
Additional References:
https://docs.rapid7.com/metasploit/
https://www.tutorialspoint.com/metasploit/index.htm
https://nooblinux.com/metasploit-tutorial/
https://www.metasploit.com/get-started
https://www.esecurityplanet.com/products/metasploit-framework-tutorial/