OS Detection using Metasploit Framework

In previous article, we identified the name of the operating system using Ping command. But today we’ll show you that how you can identify the OS using one and only one post exploitation…

Read more