Senin, 27 Februari 2012

Use Auxiliary on metasploit

usefulness of the auxiliary is not exploitation but rather to perform the task of supporting a petrified during pentest
  example:  

  •  scanning for the host
  •  find a configuration of the service
  • ooking for miss-configuration



 to see all the auxiliary, we can use the show command on the auxiliary msfconsole

to understanding my provide a video tutorial: Auxiliary Modules
 

2 komentar: