Scanning and Enumeration

In this chapter I'll show you the basic commands of nmap, a way where you can practice your scans and a short introduction how you can use the metasploit auxiliary modules to scan for smb and http.

Last updated