O'Reilly logo
  • Dean Bushmiller thinks this is interesting:

Example 7-2. Using searchsploit within Kali Linux

From

Cover of Network Security Assessment, 3rd Edition

Note

need internet connection