Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,350 --> 00:00:05,770
And map random scan and exclude IPD to within a map.
2
00:00:05,770 --> 00:00:11,710
You can scan any number of random targets on a network right to do this simply type and map.
3
00:00:12,080 --> 00:00:13,760
Shy R and the host number.
4
00:00:15,330 --> 00:00:21,660
So this penetration test can be used to set random targets and make discoveries related to these targets.
5
00:00:21,720 --> 00:00:26,090
So log in to Kelly Linux open terminal.
6
00:00:26,160 --> 00:00:36,270
So for example let's scan just 50 targets randomly and map 10 dot 0 two to three such 24 Dash Dash I
7
00:00:36,410 --> 00:00:37,640
are 50.
8
00:00:37,740 --> 00:00:43,140
Press enter and as you can see only 50 eyepiece were scanned.
9
00:02:08,020 --> 00:02:16,500
So then map you can scan specific targets or exclude specific targets from scanning so this command
10
00:02:16,500 --> 00:02:22,860
will be able to save his time by excluding known targets from scanning as well as knowing that there
11
00:02:22,860 --> 00:02:27,740
is a firewall on it or we can scan by excluding the eyepiece of security servers.
12
00:02:28,960 --> 00:02:35,300
So we can open the virtual machines that we created and of course remembering the IP addresses of the
13
00:02:35,300 --> 00:02:45,350
virtual machines meant employable IP DNS zero to out for 1 to 10 0 2 7 Windows 7 10 dot zero dot dot
14
00:02:45,350 --> 00:02:49,370
six Kelly Linux 10 that zero add up to about 1 5
15
00:02:54,320 --> 00:03:05,870
so a log in a Kelly Linux terminal and then map and that zero down 2 Zero slash 24 dash dash exclude
16
00:03:06,500 --> 00:03:17,010
10 dot 0 dot to dot 6 and 0 dot dot 7 press enter and as you can see the excluded IP is we're not scanned
17
00:03:19,000 --> 00:03:25,160
so we can write the threads required for this process one by one or write them into a file and run and
18
00:03:25,160 --> 00:03:33,000
map reading from this file so the map exclude file commands should be read from the file in order to
19
00:03:33,000 --> 00:03:39,010
specify the unwanted target so let's open the virtual machines that we created.
20
00:03:39,110 --> 00:03:52,370
Now we can log into county Linux open terminal and type and map 10 dot 0 2 0 slash 24 exclude file slash
21
00:03:52,370 --> 00:04:02,020
route slash desktop slash exclude list Dot T X T unprecedented and there's the example file then dot
22
00:04:02,100 --> 00:04:09,760
zeroed out to about six in 10 done Zero Dark Thirty at seven as you can see the excluded eyepiece we're
23
00:04:09,760 --> 00:04:13,660
not scan rent the N MAP results to the file.
2825
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.