except we're gonna perform a scam with any man.
A lot of people don't don't know that any map can be used as a vulnerability scanner as well,
very surprising for a lot of people. But
you're gonna be more knowledgeable with and map after this.
So our syntax for this scan will be n map Tak p denotes the port number. So we're gonna run against Port 80
and then we're gonna call the script
by typing Tak Tak script
in the script that we're gonna be using is an http sequel injection script that's shown here.
Next, we'll put tack, tack, script tak are eggs, and what that does is it lets us customize script even further. And what we're gonna be using to customize the script even further is an https spider,
uh, script argument,
which will initiate a spider ring of the page and give us a max page count.
And we'll give us back all the pages up to 200 pages.
And then at the end, you'll take the target i p address. So
let's go check it out.
So here we are in our Callie environment,
and, uh, let's execute it and see what we get back,
all right? It was a fairly quick scan that we get from a map,
why you need to use multiple tools and I just focus on one toe so and map didn't provide back the exact results that we want it.
it's not to say that it won't get successful results on another page that we might try. It just means that and map isn't really set up. Thio identify the sequel injection that is present
in the pen tester lab, so
you always need Thio to use multiple tools here. You can see here, however, that
it did identify some possible
locations of sequel injections,
and it did also give us back the Mac address, and
lesson at the host is up
didn't give us give results back this time. That's not to say that
it won't give you good results back another time against a different resource