Hi I'm just wondering if the victim actually has to open an infected exe or word doc or whatever in order to get a metasploit exploit runninng on their machine or is there any other way to do it ?
Any Way to Get a Metasploit Exploit Running on a Target Machine Without Them Having to Open a File ?
Nov 3, 2015 10:43 PM
Comments
No Comments Exist
Be the first, drop a comment!