WEBVTT

00:00.210 --> 00:00.510
Okay.

00:00.510 --> 00:08.360
Now it's time to talk about the NFC scanning vulnerabilities, severe or common vulnerability exposures.

00:08.520 --> 00:13.500
So the command will be an MAB, we will use DSP capital.

00:13.500 --> 00:17.460
And now this is it will assume that all hosts are online.

00:17.460 --> 00:20.610
So it will disable the host discovery.

00:20.610 --> 00:27.810
By the way, if you type man and map and slash bash p and like that, you can see that it will treat

00:27.810 --> 00:35.970
all hosts as online and it will skip host discovery so and map that p capital.

00:37.330 --> 00:39.220
And and here we would.

00:39.220 --> 00:40.930
But that's the script.

00:41.020 --> 00:45.550
Now this is used with the NC, the end map scripting engine.

00:45.640 --> 00:52.540
So here you can choose or use the script that you have created using the Lua or the Lua language.

00:52.720 --> 00:53.470
So.

00:55.340 --> 00:55.970
Well.

00:58.750 --> 00:59.890
And the target.

00:59.920 --> 01:04.340
Now, this one, it will scan for vulnerabilities.

01:04.370 --> 01:08.570
And this is a script used and created to scan for vulnerabilities.

01:08.590 --> 01:10.150
So like that.

01:11.550 --> 01:13.440
But the IP address.

01:15.210 --> 01:17.880
In my case, it will be 105.

01:18.090 --> 01:20.130
The IP address has changed, by the way.

01:20.130 --> 01:21.210
It's okay, no problem.

01:21.210 --> 01:27.000
And presenter by the way, this will take a lot of time because you can see that the progress is moving

01:27.000 --> 01:27.690
a little bit.

01:28.170 --> 01:34.470
Now I already make a scan for the Metasploit table two machine, which is this one.

01:34.470 --> 01:39.480
And you can see in my case it took 9 minutes and 30 seconds.

01:39.630 --> 01:47.220
So here we can see that we are using the FTP and you can see the FTP version is vulnerable and it has

01:47.220 --> 01:47.790
a backdoor.

01:47.790 --> 01:52.440
So as you can see, it is exploitable using this CVE.

01:52.950 --> 01:56.550
So which means that we are in the wrong.

01:56.940 --> 02:00.450
So this FTB server must be upgraded.

02:00.450 --> 02:01.260
By the way.

02:01.290 --> 02:03.120
This is an exploitable tool.

02:03.150 --> 02:08.670
After all, it is deliberately used to be hacked or to be vulnerable.

02:09.500 --> 02:10.280
After all.

02:11.090 --> 02:14.360
So you can see that there are other vulnerabilities like here.

02:14.360 --> 02:18.200
We can see in the cell there are some problem, whatever.

02:18.470 --> 02:18.980
Okay.

02:19.310 --> 02:26.270
And if I keep scrolling down, you will notice that we have a development problem from TCB.

02:26.270 --> 02:32.540
I think the considered the Apache server has problems, whatever as you can see.

02:32.540 --> 02:36.410
So you can see that it scanned for vulnerabilities.

02:36.410 --> 02:41.090
And this is what makes Unmapped a very powerful tool.
