Video Description

This lesson offers instructions in how to scan metasploitable. Participants learn how to set up a new project and then scan it for anything metasploitable; which is done using the IP address. This produces a simple NMAP scan within metasploit which offers a start in coming up with potential items that need further investigation.

Course Modules