Metasploit Penetration Testing Cookbook(Third Edition)
上QQ阅读APP看书,第一时间看更新

Using the database

Once the database is configured, we can start using it. First, we will take a look at how to import data from external tools using the db_import command.