1. What is Metasploit? | ![]() |
2. What is information gathering in the context of Metasploit? | ![]() |
3. How does an auxiliary scanner in Metasploit work? | ![]() |
4. What are some commonly used auxiliary scanners in Metasploit? | ![]() |
5. Is Metasploit only used for malicious purposes? | ![]() |