Enter a target URL to begin the scan. The system will crawl the website, perform a series of attacks, and provide a vulnerability report.