1 00:00:00,210 --> 00:00:08,250 OK, now it's time to talk about the NSA scanning vulnerabilities or common vulnerability exposures, 2 00:00:08,640 --> 00:00:16,820 so the command will be and map we will use DSP capital and now this is it will assume that all hosts 3 00:00:16,830 --> 00:00:17,450 are online. 4 00:00:17,460 --> 00:00:20,420 So it will disable that discovery. 5 00:00:20,730 --> 00:00:28,170 By the way, if you type man and map and slash p.m. and like that, you can see that it will treat all 6 00:00:28,170 --> 00:00:31,860 hosts as online and it will skip host discovery. 7 00:00:32,490 --> 00:00:35,850 OK, so and map that P capital. 8 00:00:37,280 --> 00:00:39,210 And and here we were. 9 00:00:39,230 --> 00:00:45,380 But that's the script now this is used with the NSC, the unmap scripting engine. 10 00:00:45,770 --> 00:00:52,380 So here you can choose or use the script that you have created using the new or the Lewa language. 11 00:00:52,820 --> 00:00:53,300 So. 12 00:00:55,320 --> 00:00:55,800 Well. 13 00:00:58,640 --> 00:01:04,780 And the target now, this one, it will scan for vulnerabilities out. 14 00:01:05,060 --> 00:01:08,390 This is a script he used and created to scan for vulnerabilities. 15 00:01:08,720 --> 00:01:09,950 So like that. 16 00:01:11,530 --> 00:01:13,270 But the IP address. 17 00:01:15,130 --> 00:01:20,110 In my case, it will be one hundred and five, the I.P. address has changed, by the way. 18 00:01:20,170 --> 00:01:21,950 It's OK, no problem at present. 19 00:01:22,300 --> 00:01:27,570 By the way, this will take a lot of time because you can see that the progress is moving a little bit. 20 00:01:28,240 --> 00:01:34,270 Now, I already make a scan for the meters, blocked a bill to machine, which is this one. 21 00:01:34,570 --> 00:01:39,300 And you can see in my case, it took nine minutes and 30 seconds. 22 00:01:39,760 --> 00:01:47,500 So you can see that we are using the FTB and you can see the FTB Virgin is vulnerable and it has a back 23 00:01:47,500 --> 00:01:47,760 door. 24 00:01:47,860 --> 00:01:52,270 So as you can see, it is exportable using this KVI. 25 00:01:53,050 --> 00:01:56,500 So which means that we are in the wrong. 26 00:01:57,040 --> 00:02:00,400 So this FTB server must be upgraded. 27 00:02:00,490 --> 00:02:03,160 By the way, this is a meta slaughterman, too. 28 00:02:03,160 --> 00:02:08,580 After all, it is deliberately used to be hacked or to be vulnerable to. 29 00:02:09,460 --> 00:02:15,970 After all, OK, so you can see that there are other vulnerabilities like here, we can see in the and 30 00:02:15,970 --> 00:02:18,840 there are some problems, whatever, OK? 31 00:02:19,360 --> 00:02:24,430 And if I keep scrolling down, you will notice that we have a human problem. 32 00:02:25,390 --> 00:02:32,400 TCBY, I think the can that the Apache server has problems or whatever, as you can see. 33 00:02:32,620 --> 00:02:36,340 So you can see that it's scanned for vulnerabilities. 34 00:02:36,460 --> 00:02:41,050 And this what makes and map a very powerful tool.