Metasploit mailing list archives
Uses
From: wieczor8 at msu.edu (Gerald Michael Wieczorek)
Date: Sat, 09 Oct 2004 01:58:39 -0400
Do I understand this right,with metasploit I can type in an IP and it will tell me what exploits are available on that pc to obtain root? I could use this to check my execs PC's at home for security risks. I am not an IT person excuse the post if its off subject. Gerald
Current thread:
- Uses Gerald Michael Wieczorek (Oct 08)
- <Possible follow-ups>
- Uses ninjatools at hush.com (Oct 08)