How do you use the search function in metasploit?
Trust me, I feel stupid asking this, but how does the search function work? Check this out:
msf6 > search name:wordpress_login [-] No results from search msf6 > use wordpress_login_enum Matching Modules ================ # Name Disclosure Date Rank Check Description - ---- --------------- ---- ----- ----------- 0 auxiliary/scanner/http/wordpress_login_enum normal No WordPress Brute Force and User Enumeration Utility Interact with a module by name or index. For example info 0, use 0 or use auxiliary/scanner/http/wordpress_login_enum
Why didn’t it return the result “wordpress_login_enum” when I searched “wordpress_login” ? How can I more effectively use the search function?
submitted by /u/Lazy-Reserve-131
[link] [comments]