nebula105 wrote: » The lab basically goes: 1) Search for target, 2) Exploit target using Metasploit.
[I]nmap -p- -sV -oX scan.xml <target_ip>[/I] [I]searchsploit -nmap scan.xml[/I]