Next Metasploit guide?

The next tutorial to be written

  • I want to learn how to create a bin and get full access to a computer

    Votes: 0 0.0%
  • I want to learn how to use nmap and find vulns inside systems

    Votes: 0 0.0%

  • Total voters
    0
  • Poll closed .

Bmthrules

Power member.
Reputation
0
If you haven't learned what Metasploit is, click here.

What guide would you like next?

How to create a binary that reverse connects to you and gives you full access to the victims computer.

Or

A in depth tutorial on nmapping with Metasploit.
 
You should try giving explanations for dummies.
I'd say a lot of users here would've seen the first one and read "asdf herpa derpderp full access to victims computer."
And I doubt many know what nmapping is.

Anyway, I'd say the first one because more users would be interested in it
 
I want to learn how to use nmap and find vulns inside systems.

I was going to do this like last year but lost motivation as i found that you could pretty much only find vulns in older computers such as xp and below?
 
Do a metasploit guide & tell people to use the nmap gui for scanning.
 
MySQL said:
Do a metasploit guide & tell people to use the nmap gui for scanning.

Metasploit has nmap command line built in though.
 
Cookies are required to use this site. You must accept them to continue using the site. Learn more…