Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this second part covering WMAP, Dean discusses moving forward with running a scan on the discovered modules. He mentions an important point about making sure there is sufficient RAM allocation on the target VM in order to support the overhead generated from the scan. Once the WMAP scan is complete, you then have a list of potential vulnerabilities present on the target host.