1 00:00:00,180 --> 00:00:08,180 OK, now it's time to talk about the A.C. scanning vulnerabilities, CTE or common vulnerability exposures. 2 00:00:08,610 --> 00:00:10,500 So the command will be in map. 3 00:00:11,280 --> 00:00:19,080 We will use DSP Capital and now this is it will assume that all hosts are online, so it will disable 4 00:00:19,080 --> 00:00:20,400 the host discovery. 5 00:00:20,700 --> 00:00:27,750 By the way, if you type man and matt and slash bass p and like that, you can see that it will treat 6 00:00:27,750 --> 00:00:31,830 all hosts as online and it will skip host discovery. 7 00:00:32,369 --> 00:00:35,760 OK, so and Matt Dash P Capital. 8 00:00:37,250 --> 00:00:44,870 And and here we will, but that's the ActionScript now this is used with the NSC, the map scripting 9 00:00:44,900 --> 00:00:45,320 engine. 10 00:00:45,740 --> 00:00:52,310 So here you can choose or use the script that you have created using the new air or the liwa language. 11 00:00:52,790 --> 00:00:53,210 So. 12 00:00:55,290 --> 00:00:55,680 Well. 13 00:00:58,620 --> 00:01:01,200 And the target now this button. 14 00:01:01,590 --> 00:01:03,990 It will scan for four vulnerabilities. 15 00:01:05,010 --> 00:01:08,310 This is a script used and created to scan for vulnerabilities. 16 00:01:08,640 --> 00:01:09,840 So like that? 17 00:01:11,480 --> 00:01:13,160 But the IP address. 18 00:01:15,090 --> 00:01:19,980 In my case, it will be one hundred and five others has changed, by the way. 19 00:01:20,070 --> 00:01:21,900 It's OK, no problem at present. 20 00:01:22,230 --> 00:01:27,230 By the way, this will take a lot of time because you can see that the progress is moving anything. 21 00:01:27,240 --> 00:01:34,170 But now I already make a scan for the Metasploit to build tool machine, which is this one. 22 00:01:34,500 --> 00:01:41,640 And you can see, in my case, it took nine minutes and 30 seconds, so you can see that we are using 23 00:01:41,640 --> 00:01:44,780 the FTB and you can see the FTB. 24 00:01:44,790 --> 00:01:52,170 Virgin is vulnerable and it has a back door, so as you can see, it is exploitable using this TV. 25 00:01:52,950 --> 00:01:56,380 So which means that we are in the room. 26 00:01:56,910 --> 00:02:00,270 So this have to be server must be upgraded. 27 00:02:00,360 --> 00:02:07,140 By the way, this is a meter spoke of and to act on it, it is deliberately used to be hacked or to 28 00:02:07,140 --> 00:02:08,389 be vulnerable. 29 00:02:09,370 --> 00:02:09,940 After all. 30 00:02:10,539 --> 00:02:16,210 OK, so you can see that there are other vulnerabilities like here we can see in the US and there are 31 00:02:16,240 --> 00:02:18,690 some problem, whatever, OK? 32 00:02:19,240 --> 00:02:25,930 And if I keep scrolling down, you will notice that we have 15 minute problem TCB. 33 00:02:26,170 --> 00:02:32,230 I think that I can see that the Apache server has problems, whatever, as you can see. 34 00:02:32,470 --> 00:02:39,090 So you can see that it scan for vulnerabilities and this what makes end map of.