Metasploit was written in Ruby!

  • Footprinting
  • Scanning

compiling exploits

shellcode

payload

privilege escalation

“Proxy pivoting generally describes the practice channeling traffic through a compromised target using a proxy payload on the machine and launching attacks from this computer. This type of pivoting is restricted to certain TCP and UDP ports that are supported by the proxy.”

Post-Exploitation

log cleanup

persistence