Video Description

In this second part covering WMAP, Dean discusses moving forward with running a scan on the discovered modules. He mentions an important point about making sure there is sufficient RAM allocation on the target VM in order to support the overhead generated from the scan. Once the WMAP scan is complete, you then have a list of potential vulnerabilities present on the target host.

Course Modules

Metasploit