Using msftidy
Nevertheless, before we run this module, let's check whether the module we just built is correct with regards to its syntax. We can do this by passing the module from an in-built Metasploit tool named msftidy, as shown in the following screenshot:
We will get a warning message indicating that there are a few extra spaces at the end of line 20. When we remove the additional spaces and rerun msftidy, we will see that no error is generated, which means the syntax of the module is correct.
Now, let's run this module and see what we gather:
We can see that the module ran successfully, and it has the banner of the service running on port 21, which is 220-FileZilla Server 0.9.60 beta. The report_service function in the previous module stores data to the services section, which can be seen by running the services command, as shown in the preceding screenshot.
For further reading on the acceptance of modules in the Metasploit project, refer to: https://github.com/rapid7/metasploit-framework/wiki/Guidelines-for-Accepting-Modules-and-Enhancements.