Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this video we have a look at other scanners available in Metasploit for information gathering. The approach demonstrated by Dean is to begin with a broad set of scans where we examine ports and essential services such as TCP. During this phase, it's more efficient to run multiple scanners simultaneously using multiple threads of execution. Once basic ports and services have been identified then it's time to hone in with more specific scanners in order to uncover potential vulnerabilities. Metasploit offers a vast selection of scanners for just this purpose!