1 00:00:00,150 --> 00:00:10,950 So we are going to take a look at another crew that is Amus, so this was all of us and it was probably 2 00:00:11,160 --> 00:00:12,900 written recently. 3 00:00:12,900 --> 00:00:20,860 That means there are two hundred of years, maybe two years or another year that so far using in 2020 4 00:00:20,910 --> 00:00:21,430 version. 5 00:00:21,810 --> 00:00:26,670 We don't need to worry about the installation process, but we are using somewhat older versions like 6 00:00:26,670 --> 00:00:27,740 17 or 18. 7 00:00:28,140 --> 00:00:36,620 We need to install a milestone and can easily such a mosquito. 8 00:00:36,630 --> 00:00:38,790 And there is there are some comments on. 9 00:00:39,930 --> 00:00:45,570 So of course, everyone is using next 230 impertinently. 10 00:00:45,570 --> 00:00:47,930 So that's what you need to hear about the installation. 11 00:00:48,450 --> 00:00:54,600 We can just check type games so it gives us some HelpAge. 12 00:00:55,470 --> 00:01:03,070 And in that HelpAge I can type games and I can specify Intel or know we baby Adina's. 13 00:01:03,130 --> 00:01:05,630 These are the options I can do to Ms. 14 00:01:06,120 --> 00:01:07,370 So let's explore. 15 00:01:07,380 --> 00:01:08,100 What are those? 16 00:01:10,190 --> 00:01:13,770 So am I seeing to discuss are targets for renumeration sake? 17 00:01:14,430 --> 00:01:21,620 Uh, I'm getting some information gathering about the targets and performing operations and network 18 00:01:21,620 --> 00:01:21,990 mapping. 19 00:01:22,190 --> 00:01:31,100 So this is our main, uh, command using this video to discover the subdomains and your mess with the 20 00:01:31,160 --> 00:01:37,600 numeration designs so we can also store them in the database. 21 00:01:37,940 --> 00:01:44,390 But with this piece, we can also do this and you can also resolve their business names. 22 00:01:45,620 --> 00:01:53,330 So we have all this in the DNA records, but we see the images in this video that you Masino. 23 00:01:55,730 --> 00:02:04,950 So we have a whole bunch of options we can specify, uh, Act two for attempted transfers and in some 24 00:02:04,970 --> 00:02:11,880 way just to get some lettuce and I paid the screeners I paid the soonest we have got from the previous 25 00:02:12,050 --> 00:02:19,130 business, you know, so this tool would also, uh, that does address i.p rather than just another 26 00:02:19,130 --> 00:02:26,660 thing is you can just, uh, add to be enough that's been requested subdomains and you can also, uh, 27 00:02:26,720 --> 00:02:29,780 do the brute protection to brute force the subdomains. 28 00:02:30,440 --> 00:02:32,360 Uh, you can also destroy the file name. 29 00:02:34,460 --> 00:02:35,120 So. 30 00:02:38,980 --> 00:02:47,760 So we can also display the IP addresses for the discordance, that means what business does it represent, 31 00:02:47,770 --> 00:02:50,650 the domain name and the corresponding IP address area code. 32 00:02:50,650 --> 00:02:50,870 Right. 33 00:02:51,280 --> 00:03:02,620 We can also put the IP option for that option so that that's all you can pretty much explore these options 34 00:03:02,620 --> 00:03:03,250 one by one. 35 00:03:04,640 --> 00:03:08,470 It's A Masino minus B for domain. 36 00:03:09,790 --> 00:03:12,000 And I want to say Goldacre. 37 00:03:14,250 --> 00:03:24,990 So let's try to find the subdomains, I know what this does is it has very large searching, searching 38 00:03:24,990 --> 00:03:25,410 options. 39 00:03:25,410 --> 00:03:29,690 It will search from most other search engines and it will collect subdomains. 40 00:03:30,180 --> 00:03:37,750 You can see the elements to this quoting almost are the Web and anada some search engines for that. 41 00:03:37,770 --> 00:03:45,120 SubDomains can see the Yahoo and Hekker, Target and Google and others. 42 00:03:45,720 --> 00:03:52,240 So you can see there is a lot more information than our previous tools considered. 43 00:03:52,470 --> 00:03:53,910 These are the subdomains. 44 00:03:54,540 --> 00:04:02,430 And if you find any subdomains relating to development or like they are testing, you can just pretty 45 00:04:02,430 --> 00:04:09,580 much concentrate on the subdomain because it's not exposed to the outside world. 46 00:04:09,630 --> 00:04:15,600 I am pretty sure that will be like testing purposes that say that subdomain will be interesting from 47 00:04:15,600 --> 00:04:16,820 the point of view. 48 00:04:42,170 --> 00:04:49,820 So the scan has not completed yet, but I presume the controversy, because we are we have got so much 49 00:04:49,820 --> 00:05:00,320 of information from the human skull because the human skull searches are watched, so many sites for 50 00:05:00,320 --> 00:05:01,040 the suppliments. 51 00:05:04,340 --> 00:05:11,670 So you can think that Hamas is so positioned in this fighting subdomains, two thousand six hundred 52 00:05:11,690 --> 00:05:16,640 one names are discolor and you can see this is the numbers. 53 00:05:17,000 --> 00:05:23,690 These numbers are these are for conducting from an autonomous system to the autonomous system. 54 00:05:24,030 --> 00:05:29,580 We can see under this IP address 190 subdomains and this under the threat you have got. 55 00:05:30,260 --> 00:05:34,400 And so we got this many subdomains. 56 00:05:34,400 --> 00:05:40,510 And also we have got another one called Building or Sharing Information Technology. 57 00:05:41,510 --> 00:05:44,330 Maybe that's on of the school. 58 00:05:44,370 --> 00:05:49,490 There are supporters of government which has in contact with this rule suppliments. 59 00:05:51,000 --> 00:05:53,810 So that much that is what does a must do. 60 00:05:53,850 --> 00:06:01,760 You can also explore the other options for much more, getting the information about that party.