14 hours 26 minutes
All right, so let's move on to vulnerability identification. We didn't find
potential vulnerabilities in some cases just from our map scanning in the previous section. But now we're going to actually start verifying vulnerabilities and find some additional ones, but we can exploit them when we get the exploitation.