Metasploit mailing list archives

Choosing the appropriate exploit/vulnerability


From: Bryan Sudduth <sudduth () gmail com>
Date: Fri, 13 Aug 2010 15:35:00 -0500

I have newly installed metasploit, can successfully scan a host and store
results in the database, but my question:  how does one know which services
are vulnerable AND which "exploit" to be used to exploit the vulnerability?
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: