| http://www.w3.org/ns/prov#value | - These exploits can target platforms such as Windows, Linux, Cisco, the iphone and several 3rd party applications.Below I will list a few basics that I found useful when finding my way around Metasploit and I will end the post by demonstrating an attack on a host and then looking at the host for some signs of the attack.ToolsMetasploit 3.1nmapThe Basics1.
|