Search
-
Metasploit, Exploits and eJPT
Hey guys, I'm currently on the final lab of the eJPT course, and I'm a little confused and would like all of your input! The lab basically goes: 1) Search for target, 2) Exploit target using Metasploit. My first step here; would be to identify the target and the OS running on it using nmap. I'm confused on the next step,… -
Re: Why don't they update RIP to use a better metric?
I have audited and pentested some of the largest financial networks in the country and have seen RIP deployed more frequently than any other protocol combined, not counting static routes (which aren’t a protocol per se). In the banking world you almost don’t see any routing protocols in institutions worth less than $500m.…
2 results