Metasploit mailing list archives

Uses


From: wieczor8 at msu.edu (Gerald Michael Wieczorek)
Date: Sat, 09 Oct 2004 01:58:39 -0400


Do I understand this right,with
metasploit I can type in an IP and it will tell me what exploits are 
available on that pc to obtain root? 

I could use this to check my execs PC's at home for security risks. 

I am not an IT person excuse the post if its off subject. 

Gerald




Current thread: