1 00:00:00,850 --> 00:00:03,580 And let's have a look at applications on the same service. 2 00:00:04,740 --> 00:00:07,830 So this is not just all about the target domain. 3 00:00:08,980 --> 00:00:15,160 Because in general, while we're conducting a penetration test, we say the you are well to the address 4 00:00:15,160 --> 00:00:25,200 of the Web application and especially in an intranet network, it's quite often to see unusual you URL 5 00:00:25,210 --> 00:00:25,840 addresses. 6 00:00:27,070 --> 00:00:34,810 In the port and service detection part, I'm going to show you a couple of things, but sometimes you 7 00:00:34,810 --> 00:00:40,150 will see just an HTP service on a port with different applications. 8 00:00:41,290 --> 00:00:51,930 And Earles may be in the form of HTP, Coingate domain, dot com slash app, one APTA, etc.. 9 00:00:52,840 --> 00:00:59,590 So in a situation like that, you will need to detect these applications to get extra information about 10 00:00:59,590 --> 00:01:00,270 your target. 11 00:01:01,310 --> 00:01:08,090 It's really no tool to use in a situation like that, so you will have to manually discover these kinds 12 00:01:08,090 --> 00:01:09,620 of applications.