Dean Bushmiller thinks this is interesting: Example 7-2. Using searchsploit within Kali Linux From 7. Assessing Common Network Services from Network Security Assessment, 3rd Edition by Chris McNab Publisher: O'Reilly Media, Inc. Released: December 2016 Note need internet connection Share this highlight http://www.safaribooksonline.com/a/network-security-assessment/7950147/ Twitter Facebook Google Plus Email Get Instant Access Now Start a Free Trial Learn about Safari for Business Have an account? Sign in. Minimise Unlock the rest of Network Security Assessment, 3rd Edition and 30,000 other books and videos By clicking this box, you confirm that you have read and agree to the terms and conditions of our Membership Agreement, and you understand that when your trial period ends, you will be required to provide billing information if you wish to continue using the service. Unlock the rest of this book Start a Free 10-Day Trial loading Learn about Safari for Business Have an account? Sign in.