![Kali Linux Network Scanning Cookbook(Second Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/179/36701179/b_36701179.jpg)
上QQ阅读APP看书,第一时间看更新
How it works...
The underlying principle for how ARP discovery is performed by Metasploit is once again the same. A series of ARP requests is broadcast, and the ARP responses are recorded and output. The output of the Metasploit auxiliary module provides the IP address of all live systems, and then it also provides the MAC vendor name in parentheses.