136
◾
Ethical Hacking and Penetration Testing Guide
Another advantage of using exploit-db is that it indicates if a particular
exploit is verified or
not. This way, you won’t end up running exploits that don’t work. Also, it would tell you if a
Metasploit module is available for a particular exploit so you don’t have
to do the tedious work
of downloading, compiling, and debugging the exploit again.
Dostları ilə paylaş: