In this series of articles, we are focusing on the various mechanisms of the Metasploit Framework that can be used by Penetration Testers. Today we are going to learn about the workspace and database commands of the Metasploit Framework. Table of Content Introduction Creating a Workspace Hosts Database Vulnerabilities Database
The post Metasploit for Pentester: Database & Workspace appeared first on Hacking Articles.