2 hours 24 minutes
I have one. Welcome back to the course. So in the last 30 we just went ahead and ran our second and Matt Command. So we combined from a different I p addresses 102.168 dot zero Got wind that we did not 10 as well as 100.100.
So that was step 16 of our lab. So now the results are complete. So question number two here Are there any ports displaying for the particular I P addresses that we ran the scan on?
So you could easily see in the background there for me at least that Yes, I see all sorts of ports open, so I see them open on he 0.1 address for us.
All right, so the last step of our lab here, we're gonna actually just run the h Ping three command. So I'm gonna go ahead and clear my terminal window here to make it a little easier to read. You're welcome to do so as well. Or in Venice. Leave yours. As is, it doesn't actually affect the output of the command we're running.
So to clear my screen, I'm just gonna type in the word clear, and then just press enter and you'll see all the commands and previously type disappear for us.
All right, So the command we're gonna run here is gonna be a chipping three
dash eight, which is basically just enabling the scan mode that we're gonna give it a range of ports to scan.
We're gonna scan it with the sin packets were descending the sin flag or they were setting the sinful Excuse me. Now that we're just gonna do it going to do it against just one i p address. So that main I p address that we've been using throughout this entire lab.
All right, so let's go intact. That ends, we'll go step by step here.
So h p three,
we'll put a space,
and then we're gonna type in the dash eight and then we're gonna put a space and then type in 0-5000. So let's go and do that. Now
we're typing Dash eight
Space 0-5000. Again, we're specifying the range of ports that we want to scan.
We're gonna put another space,
and then we're just gonna type in a dash Capital s again. The said that the Tell it that we want to do a seance can
and then our i p address again that we've been using this entire time.
So Dash Capital s will put another space and then our 102.168
got 0.1 and then just press enter on your keyboard.
Now, it might take a moment or so to pull back the results. You'll see it gives us some results right away there so we can actually go ahead and answer our question on our lap as that's finishing running.
So the question is, are there any ports not responded. So let's take a look at her out. But, you see, it just takes a few seconds to actually run that command.
So we see all these different port members here, let's scroll back up a little bit and see, like, what does this actually mean? What are all these poor numbers right here that we see? Are these open or close?
Where are they not responding? Let's see here.
So my take a moment or so to come all the way back up in their results here,
but basically what we're looking for is it's gonna tell us that all these numbers were seeing down here near the bottom section of the output. This is all gonna be ports that are not responding. So let's go back up here. We should be almost there.
You'll see some of them are labeled lycopene, VPN, et cetera. Many of them are not label. They're just random ports.
All right, so you'll see here as we scroll back up, you'll see not responding ports right there.
And that's what we're looking for. So here in question number three, are there any ports not responding? The answer, of course, would be, yes, there. And if you wanted to put all these port numbers down, you certainly could do so. It's probably quite a bit, so it's Ah, it'll take you a moment, certainly. And then if we scroll back up a little further, we can see all the ports that are responding to us, and the service is running on those particular ports.
All right, so this lab again and we were just looking for some open ports again, just a little bit of hands on practice to take a look at those things. It's part of the scanning process that we would normally be doing again. The intent, of course, is to find vulnerable systems in a way into the network. And that way we can compromise it and move forward with whatever our nefarious goal is from there.
So in the next video, we're just gonna go over some more scanning s. We'll take a look at that in the next month.
Scanning, Enumeration, and Vulnerabilities
This course covers basic scanning, enumeration, and vulnerability scanning as part of a penetration test.