Time
2 hours 24 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:01
everyone Welcome back to the course. So in the last video, all we did is we started off with our first and Matt command. So we went ahead and love into our lab environment. We went ahead and launched her Callie Lennox machine and lost the terminal window. Initially retyped, I've configured we took a look at the Ethernet interfaces. Well, it's the loop back interface, and we also grab the i p address of R. Kelly machine.
00:21
In this video, word is gonna finish out reviewing our output of the particular can man we typed in. So we talked in and map and then we use the dash lower case sn flag again. That was to disable port scanning. So basically, it's just sending a ping request for us. And we scared a range of the one under cute of 168.0 dot one all the way to 2 54
00:40
to see what kind information we get back. Now, you see in the background there that we didn't get a whole lot of information back on the particular command.
00:46
But we have a couple of questions that we need to answer. No. Now, if you have not done this particular command yet. And Iran it. You'll want to go ahead, pause this video on either run the command or go back to the last video. If he skipped over that one and make sure you go through the steps in this lab again, we've designed these labs as a step by step process. So that way you can go concurrently through all of them.
01:06
All right. So question number four, here's where we're at. So we've gone ahead and ran our map dash lower case S n and then our i p address. Come in there.
01:12
So question number four are the hosts up. And if yes, right down the Mac addresses.
01:19
All right, So are the host up. So I see on my end. Yes, I see all these hosts are up, and I see the Mac address is here
01:26
for these particular items.
01:30
And so I would John all those down in my document.
01:34
Our Chris number five, the host her up, which have already established that. Yes, they are. What? The iittie addresses of those hosts.
01:42
All right. So again, we see that we have all over right? I p addresses that we've found. So here we've got our initial one. Here are Callie Lynette's machine. And then we've also got 12.168 dot 0.21 attitude out 168.0 dot 4.5 to 50 ET cetera.
02:00
Let's go back to our lab document.
02:02
So now we're gonna run command basically disables coast discovery again in the dumb little bit. Resource is, I have a listing of unmet commands as well ast the specific commands. I want you to practice as kind of part of the assessment portion of this course.
02:16
So are we gonna do in our terminal window? Here is what is gonna type in this command here. The end map, dash capital P lower case, and and then again, the same range of I P addresses. Now, I'm gonna go ahead and type clear in my terminal window just so I can clear it up and make it a little prettier. You don't have to do the step, but if you want to follow along and do it
02:35
to stopping the word clear and then just press enter,
02:38
you know, said, just clears everything it starts is back in essentially the beginning when everything looked fine.
02:44
All right. So, as I mentioned, we're gonna go ahead and type in this command here, the end map, dash capital P lower case in, and then our i p address range. So let's go ahead and do that now
02:53
and map all over case
02:54
space, dash capital P lower case in.
02:58
We'll put a space and then our i p address range. So again, it's 100 to 168.0. That one Ford slashed 24.
03:07
And we'll go ahead, hit, enter on her keyboard and run that as well.
03:09
Yeah, I'm gonna go ahead. Paul's video. Here it just take a moment or so to run this and we'll pick things back up once we have the results.
03:16
All right, so we have our results now. So we went ahead and ran our scan to disable host Discovery. So we have some results on the screen here, so let's take a look at her lab document. We just have one quick question here. What response do you actually see?
03:30
All right. So what I see is I see that it's provided me some port center open. It shows me that there's some close ports there that I don't necessarily care about too much, at least for the purposes of our lab. But I do see that there are some open ports here, so I know that. Okay, well, they are running. Sshh. They at least have that open.
03:46
Perhaps. You know, there's some way I can attack through that, you know, and again, thinking back to the criminal hacker mentality
03:52
of why you know why we're actually scanning stuff, right? We're trying to find potential ways into these systems.
04:00
All right, so let's go back to our lab document here.
04:03
So now we're gonna do our last step of this particular lab, which is gonna run a quick HP in command. And with this command, we're basically just doing a ping ping scan. So that's what this Dash One switch will do for us with H paying three. Now, if you're standing for something like they started Fine ethical hacker exam for E C council. You'll just want to know
04:23
commands like end mapping each bring three and kind of understand the different flags in use. If you're studying for, like, humpty a pen tests, plus that you'll also want to be able to look at like an output like this, for example, and understand what command was run to get to this particular output.
04:39
So just keep that in mind some differences in those particular exams, and we'll keep moving forward with our lab.
04:45
All right, so we are still locked into our Callie machine. We haven't changed at all. If you have closed it for some reason. Definitely lot back in and get going with a terminal window and you'll be caught up. I'm gonna go ahead and clear again just to clear the screen. And then this president turning on my keyboard
05:00
and you'll see it'll clear the screen for us So we'll go ahead on our last command here. So again we have are each paying three
05:04
space Dash one space and then our I P address here.
05:11
Let's go and take that in So H Ping three
05:15
space Dash one
05:16
space and in our I p address. So the one attitude at 168.0 dot one.
05:24
And if you need to pause the video to type that in, feel free to, it's this one right here.
05:28
All right, so let's go ahead and run this command by just pressing intern or keyboard.
05:31
And again, this one might take a moment or so to go ahead and finish out. It's usually pretty quick, so I kind of hang tight here and we'll see if it'll crank it out for us quickly.
05:41
And then once it completes, I just want you to note, if you see any type of response, it'll
05:48
so it may go for just another moment or so. Here. I'm gonna go ahead and Paul's a video and we'll take a look at once. It's finished out.
05:57
All right, So we just ran our age pink three command, and I was thinking just ah, moment of sum of money. And so I just actually use allies control C to cancel it and stop the scan. You're welcome to do that on your end as well, if if yours is still going. But so the main question here on this one is Do we see any response at all?
06:14
And the answer is yes, right. We do see that we get some kind of response
06:17
from that particular IP address. We also see our time to live, etcetera, etcetera. So with this one. We were just trying to see if we get any response it all again this lab, which is checking for life systems. So for our purposes, we were able to see that, Yes, all the systems that we were touching were alive. At least all the I P addresses were getting response from. We're live systems
06:36
eso potentially moving through
06:39
the additional scanning and then eventually enumeration aspects. We could potentially find vulnerabilities on those systems and exploit those to gain axes and then from there, move ladder through the network or steal data or whatever our final objective might be.
06:53
All right, So this video we just covered live system, you know, checking for life systems and the next lab we're gonna talk about and basically do some more and map in h ping three commands specifically checking for open ports

Up Next

Scanning, Enumeration, and Vulnerabilities

This course covers basic scanning, enumeration, and vulnerability scanning as part of a penetration test.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor