The Attack Tool Kit is a security scanner and exploiting framework. It is possible to detect potential flaws and to exploit found vulnerabilities. Please keep in mind that you should never scan a ressource without permission of the owner nor administrator.
After starting the application and modification the configuration, you have to select a plugin you want to run. This can be done by expanding the plugin tree in the main frame and clicking on your desired check. The plugin will be highlighted, read from the file and loaded into the RAM memory. On the main frame you can see the plugin overview that is the content of the loaded plugin. Read the description to learn what this check will do. If this is what you are looking for, you are able to start the attack.
There are different ways to start the attack of the selected plugin. First of all you have to know that every ATK plugin since ATK 3.0 has two different attack procedures. The detection procedure is able to detect a vulnerability without exploiting it. In most cases active banner-grabbing is used to determine vulnerable versions of checked applications. This is a very quick and less dangerous way. On the other hand the exploiting procedure is able to exploit the defined vulnerability. This is more accurate, often longer and more dangerous, because the exploitation of a flaw may affect the running system.
If you are not happy with the results or you want to change the behavior of a plugin, open the Attack Editor.
When you have finished your vulnerability scan with the ATK and you were able to detect a flaw, do not forget to realize adequate countermeasures. A security audit without solutions is worthless.