![Mastering Metasploit](https://wfqqreader-1252317822.image.myqcloud.com/cover/870/36699870/b_36699870.jpg)
上QQ阅读APP看书,第一时间看更新
Understanding the file structure
File structure in Metasploit is laid out in the scheme shown in the following figure:
![](https://epubservercos.yuewen.com/3A9801/19470393408885606/epubprivate/OEBPS/Images/Chapter_12.jpg?sign=1739551426-mvscVsxpfFOTr4VwZ9AVEA0NlkRqPgC6-0-2870d873b499a144e140026f42eaadb8)
We will cover the most relevant directories, which will aid us in building modules for Metasploit, through the following table:
![](https://epubservercos.yuewen.com/3A9801/19470393408885606/epubprivate/OEBPS/Images/006.jpg?sign=1739551426-76vaHecmcGn11b3oZGv4K2D0Grwlm0gm-0-c419eb1d88814e705a4c183da615ce1d)