Modules : About Modules : Module Types : Exploit Modules

Exploit Modules
An exploit module executes a sequence of commands to target a specific vulnerability found in a system or application. An exploit module takes advantage of a vulnerability to provide control of the target system. Generally, you use exploit modules to run remote code execution on a target machine and to target remote services and client-side applications. Some examples of exploits include buffer overflow, code injection, and web application exploits.
An exploit can be a client-side or server-side exploit. A client-side exploit typically occurs through the use of social engineering techniques. Server-side exploits, on the other hand, take advantage of active services on an exposed server.