Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this video Dean takes us on a closer inspection of the Metasploit database commands. He discusses workspaces, their importance, along with the commands to manage them. A Metasploit database provides a convenient repository for storing the results of scans such as NMap as well as discovered vulnerabilities for later reference. In addition, we learn about some very handy keyboard shortcuts to make things much easier as your navigate the msfconsole.