An ethical hacker is using Metasploit to eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for an ethical hacker is using Metasploit to exploit a known buffer overflow vulnerability in a custom application. What is the initial

Full Certification Question

An ethical hacker is using Metasploit to exploit a known buffer overflow vulnerability in a custom application. What is the initial step to perform this exploit using Metasploit?