Using the Framework
Subsections
Choosing an Exploit Module
Configuring the Active Exploit
Verifying the Exploit Options
Selecting a Target
Selecting the Payload
Launching the Exploit