Metasploit mailing list archives
Choosing the appropriate exploit/vulnerability
From: Bryan Sudduth <sudduth () gmail com>
Date: Fri, 13 Aug 2010 15:35:00 -0500
I have newly installed metasploit, can successfully scan a host and store results in the database, but my question: how does one know which services are vulnerable AND which "exploit" to be used to exploit the vulnerability?
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Choosing the appropriate exploit/vulnerability Bryan Sudduth (Aug 13)
- Re: Choosing the appropriate exploit/vulnerability Robert Portvliet (Aug 14)