In our case, we are going to set it to our Metasploitable2 IP Address. So you have to set it to the IP Address of the computer you want to attack. It is required, yet there is no value set. For the most part, you can ignore the not required options and still run the module. ![]() As you can see, some of the options are required and some are not. ![]() ![]() Ok, what do we have here? The most important thing to look at first is the Required row.
0 Comments
Leave a Reply. |