Home page logo

metasploit logo Metasploit mailing list archives

Re: (no subject)
From: Matt Gardenghi <mtgarden () gmail com>
Date: Sat, 24 Apr 2010 11:47:01 -0400

It sounds as if you need to perform quite a bit of research. First you need permission to exploit a system. If you have that, you should be able to determine the likelihood of exploitation. nmap is your friend. Google as well.

My suggestion would be to start doing research into what it means to be a pen tester. With that background, you will have a better idea on how to use Metasploit.

On 4/24/2010 11:44 AM, mohd basil wrote:
hi all
am rocky in this project
can any one help me ....
for ex:
how can i know the exploit i must use and how can i check my computer
or any thing can help me as a rocky
please dont ignore my message
and thank you all.

Your E-mail and More On-the-Go. Get Windows Live Hotmail Free. Sign up now. <https://signup.live.com/signup.aspx?id=60969>


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]