Forum Thread : How to Scan Target and Decide Metasploit Exploit to Use? Once a network is hacked, what are some tools/methods to decide on an exploit to use?