Database Attacks

first step : Nmap scan, using the “-A” flag

take a look at the available exploits and modules available on Metasploit

First thing to check: weak passwords

We can use our own dictionaries to conduct a brute-force attack

results matching ""

    No results matching ""