Unused might be wrong word but I can't think of the word rn, I'm trying to use an IP for metasploit on my network that isn't in use but don't know how, what software is best to use for this and what is the command if its terminal based (I use kali linux)
[link] [comments]
from hacking: security in practice https://ift.tt/F8oSje0
Comments
Post a Comment