Both for attacker (after the DBMS fingerprint output) and for developer/DBA (at the end, just before the "shutting down" message).
Report also about known vulnerabilities based on DBMS exact version (consider backporting!) and known Metasploit exploits.
Both for attacker (after the DBMS fingerprint output) and for developer/DBA (at the end, just before the "shutting down" message).
Report also about known vulnerabilities based on DBMS exact version (consider backporting!) and known Metasploit exploits.