Using Metasploit and Nmap to enumerate and scan for vulnerabilities

Using Metasploit and Nmap to enumerate and scan for vulnerabilities