We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hi everyone,
So I walked through shennina docs then got to the point I have been able to install it and initialize the exploits tree so stage 3.1.
I'm having at stage 4. some problems to understand the scanning, training and exploitation commands so these one :
$ ./shennina.py --lhost metasploit-ip --target target.local --service-scan-only $ ./shennina.py --lhost metasploit-ip --target target.local --use-cached-service-scan
$ ./shennina.py --training-mode --lhost lhost.local --target training-target.local
$ ./shennina.py --lhost lhost.local --target target.local --exploitation-mode
Can somebody explain to me how these commands works, what should(or can) be changed and show a practical examples with the possible outcomes please ?
Also are part 5 to 9 for information and more theoretical knowledge ?
Thanks :) Terri.
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Hi everyone,
So I walked through shennina docs then got to the point I have been able to install it and initialize the exploits tree so stage 3.1.
I'm having at stage 4. some problems to understand the scanning, training and exploitation commands so these one :
$ ./shennina.py --lhost lhost.local --target target.local --exploitation-mode
Can somebody explain to me how these commands works, what should(or can) be changed and show a practical examples with the possible outcomes please ?
Also are part 5 to 9 for information and more theoretical knowledge ?
Thanks :)
Terri.
The text was updated successfully, but these errors were encountered: