Once cSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems
and running services, search for **known vulnerabilities**, crack logon procedures of many tcp protocols, perform
man in the middle attacks such as **password sniffing** ( with common protocols dissection ), real time **traffic
manipulation**, etc, etc .