Using Display Filters
Overview
environment. I’ll just say that. And then it will keep track of that.
Not only will it keep track of your results, it will keep track of everything you find, from credentials, passwords, vulnerabilities. Every time you exploit a machine, it will let you know what exploit worked. It’s even attached to an exploit database.
Key Takeaways
We’re still at the active enumeration portion right now. The next phase is the common services threats in attacks. So the next step would be to look at the exploit DB.
There is a database created. This one currently has 46,000 entries that are readily available and work.
Part of the free Intro to Cyber course by Cover6 Solutions.