1 00:00:00,480 --> 00:00:08,190 Map, random scan and exclude eyepiece, so within the map, you can scan any number of random targets 2 00:00:08,190 --> 00:00:13,500 on a network, right to do this, simply type in map Shi'ah and a host. 3 00:00:13,500 --> 00:00:13,770 No. 4 00:00:15,260 --> 00:00:20,750 So this penetration test can be used to set random targets and make discoveries related to these targets, 5 00:00:21,630 --> 00:00:24,860 so log in to callisthenics open terminal. 6 00:00:26,090 --> 00:00:34,970 So, for example, let's scan just 50 targets randomly and map 10 out zero to two to three sets, 24 7 00:00:35,240 --> 00:00:36,320 dash dash i. 8 00:00:36,350 --> 00:00:38,390 R 50 press enter. 9 00:00:39,880 --> 00:00:43,150 And as you can see, only 50 VIPs were scanned. 10 00:02:07,970 --> 00:02:13,670 So then map, you can scan specific targets or exclude specific targets from scanning. 11 00:02:15,330 --> 00:02:22,410 So this command will be able to save his time by excluding known targets from scanning, as well as 12 00:02:22,410 --> 00:02:29,130 knowing if there's a firewall on it or we can scan by excluding the eyepiece of security servers so 13 00:02:29,130 --> 00:02:31,710 we can open the virtual machines that we created. 14 00:02:33,090 --> 00:02:38,710 And of course, remembering the IP addresses of the virtual machines, manipulatable IP 1.0, DOCTORA 15 00:02:38,740 --> 00:02:48,630 four one two 10 zero, duduk seven Windows seven 10 zero down to about six Kelly Linux and zero to two 16 00:02:48,630 --> 00:02:49,410 point one five. 17 00:02:57,490 --> 00:03:10,000 So a log in a callisthenics terminal and and map and that Zurda 2.0 slash 24 dash dash, exclude 10 18 00:03:10,000 --> 00:03:15,130 dot zero dot dot six and zero dot 237 recentre. 19 00:03:16,360 --> 00:03:20,350 And as you can see, the excluded IPAs were not SCAP. 20 00:03:22,190 --> 00:03:28,400 So we can write the threads required for this process one by one or write them into a file and run and 21 00:03:28,400 --> 00:03:30,200 map reading from this file. 22 00:03:31,800 --> 00:03:38,340 So the unmap exclude file command should be read from the file in order to specify the unwanted target. 23 00:03:39,300 --> 00:03:42,060 So let's open the virtual machines that we created. 24 00:03:42,300 --> 00:03:45,600 Now we can log in to Kelly Linux Open Terminal. 25 00:03:47,040 --> 00:03:59,400 And typed and mapped and zeroed out 2.0 24, exclude file slash O'Groats, desktop slash, exclude list 26 00:03:59,400 --> 00:04:02,150 dot t, t and percent. 27 00:04:02,730 --> 00:04:06,030 And there's the example file then dot 022. 28 00:04:06,030 --> 00:04:08,490 Dot six in 10 zero dot 247. 29 00:04:11,000 --> 00:04:16,910 As you can see, the excluded IPS were not scanned, print the map results to the final.