snalezinski8003 snalezinski8003
  • 13-12-2017
  • Computers and Technology
contestada

Which software below combines known scanning techniques and exploits to allow for hybrid exploits?​
a. ​sub7
b. ​metasploit
c. ​nmap
d. ​nessus?

Respuesta :

R00Ken
R00Ken R00Ken
  • 14-12-2017
The answer would be metasploit as it has tools for both scanning and exploiting a system.  Sub7 is a program used only for creating trojan horse exploits, nmap uses scanning techniques to create a map of a network and nessus uses scans to detect vulnerabilities in a system.  Metasploit is the only piece of software that has the functionality to do both.
Answer Link

Otras preguntas

Randy drew a scale drawing of a house. In real life, the hall closet is 4 feet wide. It is 2 inches wide in the drawing. What is the scale of the drawing?
what is the least common multiple of 6 and 10
what part of india did the mauryans not conquer
(x-4)^2+(y+12^2)=17^2 what is the length of its radius
how much oxygen would be produced by heating 20 g of mercury (II) oxide if 18.6 g of mercury is produced?
where did many early virginia settlements develop?
A skier starts from rest down a slope 500.0 M long, the skier accelerates at a constant rate of 2.00 m/s/s, what's the velocity of the skier at the bottom of th
Questions 5–7 refer to the story "Sweet Like a Crow." 5. The voice sounds like a _________ singing at Carnegie Hall. (1 point) diva child dolphin frog 6. The so
Which U.S president proposed that consumer rights be recognized
Which book, written by Thomas More, describes an ideal society where there were no rich or poor? A. Utopia B. The Divine Comedy C. Ninety-Five Theses D. The Pra