New Search

If you are not happy with the results below please do another search

1 search result for:

1

Using Metasploit to Conduct NMAP Scans

Using Metasploit and nmap together as been a useful technique for me during some of my engagements.  Below are the steps I take to implement that task. Start metasploit by issuing the following command: msfconsole Verify the status of the database by issuing the following command: db_status Run NMAP from inside msfconsole and save the […]