Video Description

In this video we have a look at other scanners available in Metasploit for information gathering. The approach demonstrated by Dean is to begin with a broad set of scans where we examine ports and essential services such as TCP. During this phase, it's more efficient to run multiple scanners simultaneously using multiple threads of execution. Once basic ports and services have been identified then it's time to hone in with more specific scanners in order to uncover potential vulnerabilities. Metasploit offers a vast selection of scanners for just this purpose!

Course Modules

Metasploit