Time
2 hours 24 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:01
Hey, everyone, welcome back to the core. So in the last video, we talked about our common tools that we use for scanning
00:07
in this video. We're gonna go ahead and check for live systems. Now we're going to use to tools in this particular lab. We're gonna talk about end map as well as H Ping or H paying three is. It's more commonly called
00:18
and we're just gonna run a couple of quick scans with both those tools. Now, keep in mind that we're not doing anything in depth in this particular lab. What is running a couple of simple scans just so you could take a look at some of the output that you're getting. I also want to mention again that the supplemental resource is section will have all of these step by step lab guides in those as well as an assignment sheet
00:38
that contains
00:39
the information on the assessment. So you'll want to do the vulnerability assessment is wealthy short footprint assessment that I have for you. So go ahead and make sure you down all those documents in the supplemental resource is section. You can continue on to be successful in this particular short course,
00:55
so you should already be logged into the cyber website. If you're watching this video eso once you lock and you just want to search for the ethical hacker practice laps. So if you just type in ethical hacker in the search box here,
01:06
you'll see that several results pull up. But you'll see this certified ethical hacker C E H. That's the one you're looking for. Once you find that, just go ahead and click on it. But they click the launch button right there. Now it's gonna ask you to launch it in a separate window essentially by clicking this launch item button. So just go ahead and do that and it'll launch up the lab for us.
01:26
So once it launches us into the lab environment, were specifically gonna be looking for, and it's actually the top option here, But we're looking for the performing check for life systems lap. So, as I mentioned already, it's that top option there now, Mind says, complete on it, since I've simply gone through these before, but yours should not show complete on it. You should just see performing a check for life systems
01:46
once you locate that just go ahead and click on it
01:49
and you'll see a star button right there. Just go ahead and click on that as well.
01:53
Take just a second or so and then you'll see all the virtual machines here. Now we want to go ahead and actually turn these on so we can use him.
01:59
So the way we do that is we just cover our mouths over top of the machine and then just selected power on option.
02:04
So we have to do that for every single one. So just have your mouse over tops like power on,
02:08
and we'll get those booting up
02:10
now. I'm gonna go and pause a video here because it does take a few seconds through these and boot up. It could take up to 30 seconds or so Someone pause, video, restart again once everything's booted back up.
02:21
All right, so we used the magical power of fast forwarding there. So now you'll see on my screen that all the devices have booted up now fears have not booted up yet. You can go ahead and Paul's video and just wait until all of yours start up again. That way you can follow along with the lab.
02:34
So now we're at step six of the last. We're gonna click on the machine labeled P Lab Win 10 are basically the Windows 10 machine. So it should be the 2nd 1 from the bottom here. We're just gonna go and click on that.
02:45
It might take a moment soon. Eventually, it's gonna pull up the Windows 10 desktop for us.
02:51
So once it pulls up the desktop, we're gonna double click on the orange colored iconic kind of looks like a little tiger's eye. We're gonna click on that, and it's labeled as a V NC viewer icon. So it's this orange colored one kind of hear in the background
03:02
and you'll see some different pop ups going on. There is the Windows 10 machine fully boots up for us on, and everything should be booted up by now. So we'll go ahead. Double click on the V NC of your icon.
03:13
So it's gonna launch this box here for us. Once we double click on this icon here by default, it should put in the I p. Address of our Callie Lennox machine in there for us. If for some reason it does not. This is the one that you'll type in there, and I also have it here in this step by step guide for you as well.
03:30
As long as you see that in there, you can go ahead and click this connected button here,
03:34
and then we're gonna type in our passwords. You'll see I haven't listed in the document here for you, so it's gonna be a capital P
03:42
lower case. A lower case S s lower case W and then the number zero. So now the capital. Oh, that's zero. And that lower case R D.
03:52
What? You've entered that and just go ahead and click on the okay button.
03:55
It's gonna launch the Cali desktop force. You'll see it there in the background.
04:00
Now, you may see a pop up message and you actually should likely see the problem message. And it basically says no session for a P I. D 77. Once you see that, I just go ahead and to say, OK, their orders ex out of it for our purposes. We don't really care about that particular air message.
04:15
All right, so the next thing we're gonna do is just double click on the route terminal option here, and that's gonna launch a terminal window for us.
04:24
Now, if you're running as I mentioned, we're gonna be using end map in H being three. If you happen to just not be using cyber last, but you're using, like, your own virtual machine. Just launch your normal Callie Linux terminal window and you could do the exact same stuff. Now, keep in mind that your I P addresses will likely defer that we're using in this lab.
04:42
So what's our terminal window opens here for us. We're just gonna simply start off with an easy command. I f config.
04:49
So let's go ahead and try it that in now. So all lower case I f
04:54
c o N f I g. Once you taught that in, just press and turn the keyboard. You'll see some results coming back quickly for us.
05:00
Are you a couple questions associated with these results? So, question number one, Do you see any Ethernet interface names?
05:09
Question number two. What is the name of the loop back interface?
05:12
I think. Finally, question number three. What is the i p address of the Cali machine? So go ahead, pause. A video. Look over the results you have there and take a look and answer those questions
05:24
***. Let me go ahead and answer these questions for us.
05:27
So we see that the Internet Ethernet interface name is E T H zero. So this one right here,
05:32
we also see we have our loop back address. And so that loop back interface is
05:36
hell o.
05:39
And then the final question was, what is he? I p address off this Callie machine.
05:44
So we see. And we already knew the answer to that. If you recall from the V NC viewer, we already had seen that it was one under 2.168 dot 0.3.
05:53
All right, let's move on with our lab document.
05:57
So now we're just gonna type in this simple and map command. Here's who were basically using this flag that dash lower case S N that's gonna disable pork scanning. Now we're scanning a range of I P addresses here, as you can see, and so it's gonna take a moment to do the scan. So once we run this command, I'll go ahead and stop. The video will pick things back up
06:14
in the next video to go ahead and answer a couple of questions here.
06:17
So in the terminal, you're gonna type and map space, dash, lower case s N Space. And then one attitude at 168.0 dot one, Ford slashed 24.
06:29
So let's go and take that in together and we'll go step by step for type in this thing.
06:32
So here to step in. And Mapple, lower case
06:35
space dash, lower case cast in
06:39
a space, and then our i p address of 102.168 dot 01
06:46
And then we're just gonna type in the Ford, slashed 24 to round things out and actually scan the range we're looking for.
06:53
All right, So what, you type that and just go ahead, press enter into keyboard. As I mentioned, it's gonna take a few moments, so to finish. So I'm gonna go ahead and stop the video there. We'll pick things back up once I have the results showing on my screen

Up Next

Scanning, Enumeration, and Vulnerabilities

This course covers basic scanning, enumeration, and vulnerability scanning as part of a penetration test.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor