!!!

Monday, February 27, 2012

example of using the metasploit auxeleri

First of all I look for auxiliary modules that I would use



 Once it determines which module will be used



and set the auxiliary which has been used





 after that run the configured auxiliary 




No comments:

Post a Comment