Bt5 vulnerability scanning tool use introduction