Vulnerability detection with Metasploit auxiliaries