How it works...

The underlying principle for how ARP discovery is performed by Metasploit is once again the same. A series of ARP requests is broadcast, and the ARP responses are recorded and output. The output of the Metasploit auxiliary module provides the IP address of all live systems, and then it also provides the MAC vendor name in parentheses.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset