All language subtitles for 1. Finding First Vulnerability With Nmap Scripts

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,530 --> 00:00:02,820 Welcome to Deployability and Analysis Section. 2 00:00:03,410 --> 00:00:08,030 So we covered scanning and we managed to discover a bunch of information about our target. 3 00:00:08,330 --> 00:00:14,080 And right now we're going to use that information to discover whether our target has some vulnerabilities. 4 00:00:14,510 --> 00:00:17,480 We're going to cover three different tools in this section. 5 00:00:17,600 --> 00:00:22,280 And the first one is going to be an already familiar tool, which is called and MAP. 6 00:00:23,360 --> 00:00:27,080 We're going to tackle a subject on EMAP scripting. 7 00:00:28,030 --> 00:00:35,200 By now, we learned that map is used for scanning targets, but MAP can also perform vulnerability analysis 8 00:00:35,470 --> 00:00:40,180 and in some cases it can even perform exploitation with the help of different scripts. 9 00:00:40,780 --> 00:00:46,390 As this is advanced use of MAP, we should first explain what are these and map scripts. 10 00:00:47,410 --> 00:00:53,180 Well, and my scripts are commonly used in scanning to detect different service vulnerabilities. 11 00:00:53,830 --> 00:00:56,580 It can also be used for brute force forcing attacks. 12 00:00:56,950 --> 00:01:00,010 It can be used to detect a malware on target machine. 13 00:01:00,700 --> 00:01:07,780 It is also used to collect even more information about databases and other network services so we can 14 00:01:07,780 --> 00:01:12,040 consider this factor to be half scanning and have vulnerability analysis. 15 00:01:13,130 --> 00:01:18,620 The goal of this lecture, however, will not be the vulnerability analysis, but to show you how we 16 00:01:18,620 --> 00:01:19,760 can run the scripts. 17 00:01:20,850 --> 00:01:25,870 And before we even run them, we need to know what are our available options. 18 00:01:26,550 --> 00:01:28,430 So where are those scripts? 19 00:01:28,440 --> 00:01:29,330 How do we run them? 20 00:01:29,700 --> 00:01:32,340 How do we know which scripts even exist? 21 00:01:33,290 --> 00:01:40,250 Inside of the clinics, we can find all the scripts that any map has inside of this directory, so open 22 00:01:40,250 --> 00:01:51,680 up your terminal and navigate to user share and map and then scripts if I type. 23 00:01:51,710 --> 00:01:52,490 All right. 24 00:01:52,490 --> 00:01:55,160 Here we can see there are a lot of them. 25 00:01:55,940 --> 00:02:01,270 Let us test some of them out and see whether they give us any information about our target. 26 00:02:01,940 --> 00:02:05,120 Now, running scripts comes with two different options. 27 00:02:05,430 --> 00:02:12,920 We can either specify one script to use in a scan or we can specify a group of scripts that we will 28 00:02:12,920 --> 00:02:19,910 use inside of a scan and to fully understand all the possible things that we can do with scripts using 29 00:02:19,910 --> 00:02:20,370 a map. 30 00:02:21,260 --> 00:02:24,440 You should take a look at this page right here. 31 00:02:25,540 --> 00:02:34,360 This is the official end, my page from the Web dot org link, and in this book and usage dot org html, 32 00:02:34,630 --> 00:02:39,160 it will give us a good explanation about script groups and the usage of unmap. 33 00:02:39,940 --> 00:02:43,300 If we scroll all the way down, here is the usage and examples. 34 00:02:44,260 --> 00:02:50,410 We get different script categories, which are script groups we can see right here that are currently 35 00:02:50,410 --> 00:02:58,690 defined categories are not broadcast, brute default discovery and many more right here and down here. 36 00:02:58,690 --> 00:03:04,040 We can read about each and every one of them to see what each script group does. 37 00:03:04,600 --> 00:03:10,720 So, for example, right here, the broad script group, it says these scripts are used to brute force 38 00:03:10,720 --> 00:03:16,360 attacks to guess authentication credentials of a remote server, and that contains scripts for brute, 39 00:03:16,360 --> 00:03:23,290 forcing dozens of protocols, including HTP, Brute, Oracle, brute as an MP, bruta and so on and 40 00:03:23,290 --> 00:03:23,740 so on. 41 00:03:24,460 --> 00:03:26,110 Let us test some of them out. 42 00:03:26,350 --> 00:03:29,110 Let us start with this off script group first. 43 00:03:30,340 --> 00:03:36,280 We can read these scripts, deal with authentication credentials or by passing them on the target system. 44 00:03:36,820 --> 00:03:42,950 Examples include X 11 Xs, FTP, Anonymous and Oracle and some users. 45 00:03:43,300 --> 00:03:47,530 Now, these right here that you read are single script names. 46 00:03:47,920 --> 00:03:53,310 And these single scripts belong to this larger script group right here. 47 00:03:53,320 --> 00:03:58,570 It also says Scripts, which uses brute force attacks to determine credentials, are placed in the broad 48 00:03:58,570 --> 00:03:59,540 category instead. 49 00:04:00,400 --> 00:04:06,310 So right here, there are no scripts that are used for brute forcing and for the brute force thing simply 50 00:04:06,310 --> 00:04:13,390 means is running a bunch of usernames and passwords onto the target system to discover which one is 51 00:04:13,390 --> 00:04:16,060 the correct username and which one is the correct password. 52 00:04:16,210 --> 00:04:18,380 But more about brute forcing later on. 53 00:04:18,400 --> 00:04:24,880 For now, let us go and test some of these scripts to run a scan with a script group we can use and 54 00:04:24,880 --> 00:04:29,430 map Bastet script, and after it we specify the script group. 55 00:04:29,540 --> 00:04:31,000 So in my case, I will use of. 56 00:04:32,030 --> 00:04:38,740 And I can Minmetals Botibol machine pretty, since I can remember since can require the privileges, 57 00:04:38,750 --> 00:04:43,010 so let's add up and type in our password. 58 00:04:44,730 --> 00:04:51,180 As soon as it finishes, we're going to see whether this off script group discovered any useful information 59 00:04:51,180 --> 00:04:53,010 for us regarding vulnerabilities. 60 00:04:53,610 --> 00:04:55,200 OK, so it is finished. 61 00:04:55,380 --> 00:04:59,780 Let us see whether our script managed to detect anything unusual. 62 00:05:00,390 --> 00:05:07,260 So we get the standard output of all the open ports and we also get some other information for some 63 00:05:07,260 --> 00:05:07,830 of the ports. 64 00:05:08,130 --> 00:05:15,450 For example, right here we get FTP enum and this FTP is just a single script name from the unmap. 65 00:05:15,990 --> 00:05:19,480 It tells us that anonymous FTP login is allowed. 66 00:05:20,300 --> 00:05:20,630 Hmm. 67 00:05:20,910 --> 00:05:21,690 What does this mean. 68 00:05:22,290 --> 00:05:25,310 Well this is something that we will cover later for now. 69 00:05:25,380 --> 00:05:29,450 Just keep in mind that anonymous login is allowed for the port. 70 00:05:29,460 --> 00:05:30,090 Twenty one. 71 00:05:31,100 --> 00:05:37,070 Under the S.H. port, we get which authentication methods are supported right here. 72 00:05:38,150 --> 00:05:45,550 Down here, we get information for the Ezekial Port, he tells us that route account has a. password. 73 00:05:46,250 --> 00:05:48,980 This can also be very useful for us. 74 00:05:50,110 --> 00:05:53,860 And right here, we can see Tomcat, two dots drumkit. 75 00:05:55,030 --> 00:05:55,880 What does this mean? 76 00:05:56,360 --> 00:06:04,240 Well, this looks like a default Tomcat credentials, and if I go down here, it tells us posts can 77 00:06:04,240 --> 00:06:05,140 script results. 78 00:06:05,460 --> 00:06:09,310 It says that this is a valid credential for Tomcat. 79 00:06:09,970 --> 00:06:12,190 It is for the service running on this port. 80 00:06:12,900 --> 00:06:13,990 Let us check this out. 81 00:06:14,140 --> 00:06:19,510 This might be the first vulnerability that we find to check whether this is correct. 82 00:06:19,630 --> 00:06:27,940 We can go and open up Firefox and we are going to make a connection to our anticipatable on this port 83 00:06:28,090 --> 00:06:28,690 right here. 84 00:06:29,810 --> 00:06:35,480 So just find out the IP address of your anticipatable and if you scanned it right now, you already 85 00:06:35,480 --> 00:06:35,700 know it. 86 00:06:35,720 --> 00:06:40,060 So for me, it is one 182, that 168 that found that six. 87 00:06:40,700 --> 00:06:48,020 And to make a connection to a portable type two dots and then the port number, in my case, what seems 88 00:06:48,020 --> 00:06:51,050 to be a vulnerability is found on this port. 89 00:06:51,530 --> 00:06:54,740 So let's go to port and double Bass Strait here. 90 00:06:57,740 --> 00:07:00,050 It seems that it only pays to deport. 91 00:07:00,080 --> 00:07:04,010 Let me just free type this and type deport like this. 92 00:07:04,310 --> 00:07:07,760 So eight one eight zero and then visit this. 93 00:07:08,540 --> 00:07:12,230 And here we get the official Apache Tomcat page. 94 00:07:13,190 --> 00:07:16,220 Let's see whether we can find something interesting right here. 95 00:07:16,550 --> 00:07:20,660 And what we are looking for based on these credentials is a login screen. 96 00:07:21,350 --> 00:07:24,530 So this Tomcat administration seems interesting. 97 00:07:24,800 --> 00:07:32,360 If I click on it, it leads us to this admin page where we are required to specify username and password. 98 00:07:32,840 --> 00:07:36,920 And down here from our scan, we got Tomcat and Tomcat. 99 00:07:37,500 --> 00:07:39,470 Let's try it out and see whether it fits. 100 00:07:39,860 --> 00:07:45,220 If I type it for the username and Tomcat for the password, click on login. 101 00:07:46,100 --> 00:07:46,790 There it is. 102 00:07:47,080 --> 00:07:50,850 We managed to log in to the admin page of the Tomcat server. 103 00:07:51,330 --> 00:07:51,770 Great. 104 00:07:52,050 --> 00:07:55,940 This is our first vulnerability that we managed to discover and exploit. 105 00:07:56,430 --> 00:07:59,680 We are now in the administrator page of the Tomcat. 106 00:08:00,200 --> 00:08:05,540 Now, there are other things that we can do right here as well, but for now we are just happy that 107 00:08:05,540 --> 00:08:09,710 we managed to gain access to the administrator page down here. 108 00:08:09,710 --> 00:08:16,130 We have user databases, mail sessions, data sources, and these are all empty because this is a test 109 00:08:16,130 --> 00:08:16,580 machine. 110 00:08:16,790 --> 00:08:22,020 But if it was a real machine, this would probably all be filled with some other useful information. 111 00:08:22,790 --> 00:08:23,180 Great. 112 00:08:23,360 --> 00:08:25,060 Let's leave this on side for now. 113 00:08:25,880 --> 00:08:32,150 So we managed to gain access to the Tomcat administrator page with the help of map script. 114 00:08:32,630 --> 00:08:34,970 Let's see what else we can do with scripts. 115 00:08:36,080 --> 00:08:44,060 So let's go and try out the malware, scan these scripts test whether the target platform is infected 116 00:08:44,060 --> 00:08:45,470 by malware or vectors. 117 00:08:46,130 --> 00:08:49,070 Let's see whether our target is infected with malware. 118 00:08:49,280 --> 00:08:54,410 We can run the same command just this time instead of what we're going to use malware. 119 00:08:55,280 --> 00:08:56,630 Let's from the scan. 120 00:08:57,600 --> 00:09:00,730 And let me control this just so we can make this faster. 121 00:09:00,780 --> 00:09:06,840 I'm going to use the dash capital F option to scan only one hundred ports and not a thousand ports. 122 00:09:07,740 --> 00:09:11,250 And it doesn't seem to find any malware right here. 123 00:09:12,330 --> 00:09:18,060 But what you can do with this can you can wait for us to first exploit them at this point in the next 124 00:09:18,060 --> 00:09:23,910 election and then test this can once again to see whether you can notice any back doors that we uploaded 125 00:09:24,090 --> 00:09:26,700 that are making connection to our Linux machine. 126 00:09:27,790 --> 00:09:34,990 For now, it doesn't seem to give us any result for the first one hundred, but let's try another scan. 127 00:09:35,540 --> 00:09:43,600 We're going to use right now Debenham script group and what banners are are simply what the open port 128 00:09:43,600 --> 00:09:46,810 will give us is the information once we connect to it. 129 00:09:47,380 --> 00:09:51,390 Banders usually called information, disclosure and information disclosure. 130 00:09:51,400 --> 00:09:57,490 They can give us the exact version of the software running on an open port and we can see the scan has 131 00:09:57,490 --> 00:10:01,930 finished and we get depen, which calls the version for the FTP. 132 00:10:02,660 --> 00:10:05,890 We get the banner for the sausage that also calls the version. 133 00:10:06,400 --> 00:10:09,850 And this is something similar for the version that we covered in Anne-Mette. 134 00:10:10,880 --> 00:10:15,890 Now, sometimes Bender will look something like this, and this is something that we cannot read, but 135 00:10:15,890 --> 00:10:20,960 I'll show you in the exploitation section that this telnet port is one of the easiest ports to exploit 136 00:10:21,350 --> 00:10:23,380 and gain access to anticipatable. 137 00:10:24,140 --> 00:10:27,710 And we are going to do this over Baner for now. 138 00:10:27,710 --> 00:10:30,020 It seems that we cannot even agree to this banner. 139 00:10:30,230 --> 00:10:35,750 But later we are going to use the exact same banner for Telnet to gain access to them at this point. 140 00:10:36,860 --> 00:10:38,400 Let's check out another skin. 141 00:10:39,170 --> 00:10:41,210 Let's try this again group. 142 00:10:41,390 --> 00:10:45,110 And this group is called Explained. 143 00:10:46,160 --> 00:10:53,060 And while it runs, if I go right here and try to find that scan group, it tells us that the scripts 144 00:10:53,090 --> 00:10:58,370 that belong to this exploit scan group aim to actively exploit some ability. 145 00:10:58,820 --> 00:11:02,230 Here are some of the examples of the script names that belong to the group. 146 00:11:02,720 --> 00:11:07,450 So this script group will actually try to exploit if it finds a similar ability. 147 00:11:07,940 --> 00:11:10,580 Let's see whether it's finished. 148 00:11:10,820 --> 00:11:12,090 And it did finish. 149 00:11:12,650 --> 00:11:20,580 Right here we can see Port 80, spidering limited to this, found the following possible seats are fallibilities. 150 00:11:21,410 --> 00:11:26,480 So here are the possible vulnerabilities that it found for this specific vulnerability. 151 00:11:27,050 --> 00:11:32,680 And for note, don't worry about this, this type of vulnerabilities for the port. 152 00:11:33,180 --> 00:11:37,510 We are going to cover deep website penetration testing, Section four Nauen. 153 00:11:37,550 --> 00:11:41,980 We're just taking a look at how we can discover them using vulnerability analysis. 154 00:11:42,440 --> 00:11:43,820 Let's go all the way up. 155 00:11:44,180 --> 00:11:45,830 And 40 outport. 156 00:11:45,980 --> 00:11:49,100 It tells us right here that the port is vulnerable. 157 00:11:49,470 --> 00:11:56,330 It is running this version and it seems that it managed to exploit it, as it says right here, vulnerable 158 00:11:56,330 --> 00:11:57,350 and exploitable. 159 00:11:58,280 --> 00:12:01,070 And right here we get the exploit results. 160 00:12:01,730 --> 00:12:08,690 The map script ran this comment and it actually managed to get the router count on the target machine. 161 00:12:09,440 --> 00:12:11,660 So we found another vulnerability. 162 00:12:12,320 --> 00:12:14,800 Here is the FTP report that is exploitable. 163 00:12:15,290 --> 00:12:20,420 Now, we don't really know how to exploit it yet, but for now, with the help of scripts and vulnerability 164 00:12:20,420 --> 00:12:23,630 analysis, we know that this right here is exploitable. 165 00:12:24,440 --> 00:12:29,480 And in the exploitation section, we're going to see exactly how we can gain access and perform the 166 00:12:29,480 --> 00:12:32,560 same thing that the EMAP performed right here. 167 00:12:33,320 --> 00:12:36,610 Now, under these IDs, you will see this name right here. 168 00:12:37,100 --> 00:12:39,160 Now get used to these type of names. 169 00:12:39,470 --> 00:12:42,560 This is how different abilities are labeled. 170 00:12:43,220 --> 00:12:47,060 These two thousand and eleven is a year when the vulnerability occurred. 171 00:12:47,700 --> 00:12:48,500 OK, great. 172 00:12:49,160 --> 00:12:51,890 But these are just some of the script groups that we can run. 173 00:12:52,140 --> 00:12:56,720 Of course, we're not going to be running all of them in this video since, as you see right here, 174 00:12:56,720 --> 00:12:57,590 there is a lot of them. 175 00:12:58,070 --> 00:13:00,890 You can test them out and see what each and every one of them do. 176 00:13:01,400 --> 00:13:04,550 But for now, let us just see how we can run one script. 177 00:13:04,880 --> 00:13:11,690 We saw how we can run script groups, but sometimes you will only want to run a single script. 178 00:13:12,020 --> 00:13:16,670 And we already know that scripts are located inside of this directory right here. 179 00:13:17,540 --> 00:13:22,910 And there is a lot let's go all the way up and try to find some cool script. 180 00:13:23,600 --> 00:13:23,950 Hmm. 181 00:13:24,590 --> 00:13:26,150 This one seems interesting. 182 00:13:26,900 --> 00:13:33,200 All bypass and this dot and as is just the extension for the scripts. 183 00:13:34,420 --> 00:13:41,080 And by the way, do not blindly run these scripts, what you can do to check out what exactly a certain 184 00:13:41,080 --> 00:13:41,680 script does. 185 00:13:42,020 --> 00:13:51,100 These you can copy its name and then run the command studio and map that script to help. 186 00:13:52,030 --> 00:13:57,340 And then the name of the script so based the script, name and type. 187 00:13:57,340 --> 00:14:03,880 And it will tell us that this particular script detect some vulnerability in that filter and other firewalls 188 00:14:04,210 --> 00:14:11,270 that use Halberstadt Anemically open ports for protocols such as FPP and Sipi right here. 189 00:14:11,290 --> 00:14:13,400 It also tells us how the script works. 190 00:14:13,420 --> 00:14:19,390 So the script works by spoofing a packet from the target server, asking for opening a related connection 191 00:14:19,390 --> 00:14:22,750 to a target port and to run it. 192 00:14:23,140 --> 00:14:29,680 In case you want to run it, you can type through the script and it is similar to running the script 193 00:14:29,680 --> 00:14:30,100 groups. 194 00:14:30,100 --> 00:14:35,790 All we need to do is just paste the name of the script and add the IP address. 195 00:14:37,330 --> 00:14:44,470 It will start running the script onto the target and for now it seems that we got the exact same output 196 00:14:44,470 --> 00:14:45,910 of a normal amp can. 197 00:14:46,690 --> 00:14:48,460 Usually you will get this output. 198 00:14:48,490 --> 00:14:50,400 That means the script didn't work. 199 00:14:51,190 --> 00:14:55,960 So since this one didn't seem to give any output, let's try another one. 200 00:14:56,620 --> 00:15:04,210 Let's try the one that we already know will give us an output and that one is FCP and on top. 201 00:15:04,210 --> 00:15:04,600 And it's. 202 00:15:05,980 --> 00:15:13,070 And remember when we ran one of the script groups, this script gave us the output for the output, 203 00:15:13,210 --> 00:15:19,840 telling us that anonymous FTP login is allowed, let's see whether we get the same result right now. 204 00:15:20,170 --> 00:15:26,740 If I run it, go all the way up and it tells us anonymous after logging a lot. 205 00:15:27,700 --> 00:15:33,760 And I already told you that FTP anonymous login means that you can use anonymous username and a random 206 00:15:33,760 --> 00:15:35,820 password to log in to the FTP. 207 00:15:36,730 --> 00:15:37,960 Let's see whether it will work. 208 00:15:37,970 --> 00:15:39,100 Let's just test it out. 209 00:15:39,400 --> 00:15:40,180 We are curious. 210 00:15:40,210 --> 00:15:46,900 We want to see what does this anonymous FTP log in me to do that we're going to connect to a target 211 00:15:46,900 --> 00:15:47,990 using FTP. 212 00:15:48,400 --> 00:15:52,510 So you just type FTP and then the IP address of the target machine. 213 00:15:52,510 --> 00:16:00,700 In our case of the metal citable press enter and right here it will ask us for the name lets type anonymous 214 00:16:03,130 --> 00:16:05,200 and let's type the password here. 215 00:16:05,200 --> 00:16:06,640 You can type anything you want. 216 00:16:06,640 --> 00:16:08,440 In my case I will just type password. 217 00:16:08,800 --> 00:16:12,040 One, two, three and press enter and here it is. 218 00:16:12,340 --> 00:16:19,060 Login successful remote system type is Unix and now we can use the help command to see what are our 219 00:16:19,060 --> 00:16:24,840 available options inside of this FTP so we can run these commands right here. 220 00:16:25,540 --> 00:16:25,920 Great. 221 00:16:25,930 --> 00:16:33,670 It seems that FTP anonymous login is indeed allowed, but once again more about FTP and the FTP liabilities 222 00:16:33,670 --> 00:16:35,890 that we discovered in the exploitation section. 223 00:16:36,460 --> 00:16:42,370 For now, we managed to find out about some potential vulnerabilities such as the Tomcat administrator 224 00:16:42,370 --> 00:16:44,170 login the FTP port. 225 00:16:44,170 --> 00:16:47,020 Twenty one should to also be vulnerable. 226 00:16:47,230 --> 00:16:51,250 Remember when we ran the Exploit script group, it told us that it is exploitable. 227 00:16:51,970 --> 00:16:57,130 But let's also see what else we can find using other vulnerability analysis tools. 23047

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.