Added testimonial.
This commit is contained in:
parent
94bcf17e49
commit
cb18a95a1f
|
@ -447,3 +447,7 @@ In fact, enum4linux will always try these ports when it is run. So if the SMB se
|
|||
> AutoRecon allows a security researcher to iteratively scan hosts and identify potential attack vectors. Its true power comes in the form of performing scans in the background while the attacker is working on another host. I was able to start my scans and finish a specific host I was working on - and then return to find all relevant scans completed. I was then able to immediately begin trying to gain initial access instead of manually performing the active scanning process. I will continue to use AutoRecon in future penetration tests and CTFs, and highly recommend you do the same.
|
||||
>
|
||||
>\- waar (rooted 4.99/5 exam hosts)
|
||||
|
||||
> "If you have to do a task more than twice a day, you need to automate it." That's a piece of advice that an old boss gave to me. AutoRecon takes that lesson to heart. Whether you're sitting in the exam, or in the PWK labs, you can fire off AutoRecon and let it work its magic. I had it running during my last exam while I worked on the buffer overflow. By the time I finished, all the enum data I needed was there for me to go through. 10/10 would recommend for anyone getting into CTF, and anyone who has been at this a long time.
|
||||
>
|
||||
>\- whoisflynn
|
||||
|
|
Loading…
Reference in New Issue