Introduction - If you have any usage issues, please Google them yourself
ased on already extracted metadata generated HTML page contains the list of potential users, this list ready for the opening of the services such as ftp, pop3, web-applications, vpn, etc. initiated by the brute force cracking attack is very useful.
In addition, the tool can also extract data leak directory listing, whereby you can probably guess the operating system, network name, and shared resources.