Time
2 hours 24 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:01
Hi, everyone. Welcome back to the course. So in the last lab, we went and checked for live systems we used and mapas Wells H p
00:08
In this video, we're gonna use the same tools. We're just going to be checking for open ports.
00:13
So make sure you loved this cyber in which you should be already and then in the search box. We're gonna type in ethical hackers. We're actually using the same lab environment as we did in the last lap. So this one right here, the certified ethical hacker C E H one
00:26
What, you click on that? Just click on the launch button. Now that is gonna have you click one more launch item button here, and that should launch the lab environment for us.
00:36
Now, once we want your lab environment, we're actually looking for this second option down to the performing a check for open ports. So let's go ahead and click on that one there
00:45
and then click on the start button and that's actually gonna pull up the lab for us. And you see all our different devices there.
00:50
Now we're gonna go ahead and turn on all of our virtual machines So the way we do that is we just cover our mouths over top of them and select the power on option.
00:59
That's gonna take just two. Probably about 20 or 30 seconds to pull these up. So I'm gonna go ahead, pause a video here once I've got him back up on my side, then we'll move forward with the lab.
01:08
All right, So all the first machines have booted up now fears they're still booting up. Go ahead, policy video and just kind of hang tight and let him boot all the way up for you because he will need at least one of them for this particular lab.
01:22
So the next thing we're gonna do is on the left side here, we're gonna click on the Windows 10 machines. So it's his P lab. Win 10 to just go ahead and click on that. And it's gonna boot up the Windows 10 desktop for us, and it takes a moment of stone. You'll see some command line prompt prompts, uh, popping up here randomly. We could go ahead, ignore those,
01:40
and then once it's all kind of booted up here and you see the command window there about pop open, so it should be good to go Now, we're just gonna double click now on this V NC viewer shortcut icon here. So it kind of looks like a little tiger's eye.
01:53
So go ahead, double click on that. It's gonna open it up for us.
01:57
So now we're here at step eight Overlaps We went ahead and love into all over to machines. We've launched them. We've clicked on the Windows 10 machine. We've opened up the VSC viewer icon by double clicking on it. And now we're a step eight here where it's launched. Force there in the background.
02:12
Now, by default, the i p address of R. Kelly Lennox machine should pop in that box for us. If it doesn't, I have listed it there. You can go ahead and type it in,
02:20
and then we're just gonna click on the connective button right here.
02:23
It's gonna ask us for a password. So the the password is the word password with a capital P and a zero instead of the oh, so we're gonna type in capital P lower case A s s.
02:35
And I think it took too many es eso capital p lower case A s s W the number zero. So again, that zero, not a capital O. And then lower case R D
02:46
and then either head enter on your keyboard. Just press the okay button there.
02:50
It's gonna take a second or so, but you'll see it'll pull up the Cali, the Knicks desktop for us. Now, you'll see this air message here. You can ignore that for the purposes of our lab today. Just go ahead and click the okay button or click the little X button to X out of it.
03:02
All right. So go back to our lab document here. We went ahead and did step 11 with love. And with the password, we had seen that air message. At least I did on my site.
03:10
And now we're gonna go ahead, double click on the route Terminal icon, and that's gonna launch the terminal window for us. Now, if you're following along in this lab with your own lab, so if you're not using the cyber labs, then you're just gonna launch a terminal like you normally would. But keeping in mind that whatever I p address, your you use is probably gonna be different than what we're using in this lab.
03:30
So just modify the lab to your needs and whatever your particular environment is using. But if you're using the cyber labs, you can follow along and it will be the same I p address that I'm using.
03:38
So once we launch the terminal window here, we're just gonna type in a simple and map commands were actually just happen and map and then 100 to 16801
03:49
And then we're just gonna take a look at the results and see if we have any response at all.
03:53
So the second and map all over case
03:55
put a space and then 192.168 dot 0.1. Then just press enter is gonna go ahead and run the command. Now it's gonna take a moment. So here, I'm gonna go ahead, pause a video. Once it's done running, I'll go ahead and restart the video and we can move on with the rest of the lab.
04:13
All right, so the output is all done and that command would ran again. We ran the end map and then our i p address for the command If you haven't done that yet, go and pause this video. Go back to the last video so you can run that command and go through the process again. These labs are designed to be a step by step guide for you.
04:29
Now, as along with that, I want to mention that all these labs have a step by step guide that's downloadable. So this guide right here that I'm using as I go through the lab that's there for you in the supplement of resource is sections you can follow along, or so you can just do the lab on your own. Alongside that, you're gonna find information about the assessment that you'll need to take for this particular
04:48
course, as well as an assessment based off like end map. So,
04:53
as an example, I have a vulnerability assessment that's part of the cyber a bundle and then also I've got an assessment regarding end map commands you so you could practice those a little more in debt, specifically specifically, excuse me speaking
05:06
along the lines of like if you're taking the company a pen test plus or the D C. Council CH. Examines certified ethical hacker exam,
05:14
you'll definitely want to know and map pretty well.
05:16
Yes, of course. You never won here After we ran that command. Was there any response at all
05:20
on? We can pretty much see in the background there that yes, there was a response. And if you wanted to, you could jot down all these different port numbers that we see that are open.
05:30
You'll also see here that it shows us the service running on a particular report. So as an example here for 3 89 c l dap for 53 of course, that d n s. As you should know, we're ready asst part of pre Rex for the scores. So the next thing we're gonna do is we're just gonna run and map again, But we're gonna run a couple of different I p addresses all in one spot here.
05:49
So let's go and do that now. So we're gonna be basically doing the same i p address. So the 0.1 and then we're also gonna add in 0.10 and 0.100.
05:57
Let's go ahead and take those in. So and map. All over case we're gonna type in the 1st 1122.168 dot 0.1
06:04
Put a space 102.168
06:08
Got 0.10.
06:11
Put a space stand. Take the nine out there
06:15
what? 68.0 dot 10
06:16
space and then one of the 2.168 dot 0.100. Once you've taught those and just go ahead and hit and turn the keyboard, I get it's gonna take a murmur. So here to run those. And so I'm actually gonna go and stop the video. In the next video, we'll pick back up with the actual output of running those commands.

Up Next

Scanning, Enumeration, and Vulnerabilities

This course covers basic scanning, enumeration, and vulnerability scanning as part of a penetration test.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor