上QQ阅读APP看书,第一时间看更新
Target enumeration
Now that we have created our projects, let's start with the first step – enumeration. There are two ways to perform enumeration: by using Metasploit's inbuilt scanning module or by importing a scan that has been done by Nmap or other tools supported by MSF.