How To Create a Metasploit Module

Today I want to review how to create a metasploit module.  This process was entirely new to me, so I decided to start from scratch, using the Metasploit Unleashed site as a guide.  My aim was to create an auxiliary scanner to look for Dropbox listeners running on the default ports of TCP/17500 and UDP/17500.  I use Kali Linux, so all of my examples will reflect such.

Continue reading How To Create a Metasploit Module