6 hours 31 minutes
Welcome to Module three of our end map course, which will focus on the details of T C P. I P that are relevant to end map.
In this first lesson, we'll talk about I p v for
there isn't a lab in this lesson. So feel free to listen or learn from a device that isn't running in map.
Let's get started.
Here are the learning objectives for this lesson.
First, we'll start with a general discussion of T C B I B version for
next we'll discuss I'd be addressing.
Then we'll talk about cider notation. And finally, we'll talk about name resolution
because most of you know how I p v four and many of its associated protocols work. I'll work hard to focus on the things relevant toe and map.
One of the pre requisites of this course is that you have some knowledge and experience with the TCP I p. Protocol. Sweet.
I'm not gonna bore you with a ton of details about the OSS I model or history of D c v. I. P.
I just want to review a couple of things that are relevant to this course.
TCB I p version for is, after all, what most lands and when still currently used either exclusively or in a duel. Stack with IBV six
T C p i. P is generally made up of two key protocols. TCP, which is a connection oriented layer for or transport protocol, and I P, which is a layer three or network layer protocol.
Connection oriented, means that the state of each TCB i p connection is maintained in order to guarantee delivery of packets. One key aspect of this is T. C. P's three way handshake.
The TCP Hi P Protocol Sweet also includes a bunch of other stuff, including the user data Graham Protocol or UDP, which is a connection lis transport protocol that may be used as an alternative to TCP
and has less overhead is we'll see when examining all of the protocol headers.
Both TCP and UDP used port numbers as a way to determine what service or application data is transferred to
in n map. Knowing how I P addresses are assigned locally, either statically or through D H cp helps when determining target hosts and networks
in America, I S P s and corporations can obtain static publicly accessible. I P addresses through the American Registry for Internet Numbers, or Aaron.
Many times network administrators get their public eye peas from their eyes. P
and typically they issue out private addresses using a private I P. Addressing scheme that uses network address translation to talk on the Internet
nn map. It really helps to know the difference between Private I P addresses in public I p addresses. It also helps if you're familiar with or have memorized common TCP and you D be ports.
However, one of the beauties of end map is that a default and maps can automatically probes for 1000 of the most commonly used TCP and you d be pores
using the Dash Capital F command line Switch will cut that number down to 100 of the most commonly used ports.
All included cheat sheet with the 100 most commonly used TCP and UDP ports. In this lesson
in i P, addressing numbers are usually seen in their decimal form, such as 1 92.1 68.1 dot one,
so there are four sets of numbers separated by decimal points.
These numbers are read by network devices in their binary form, and each set is called an octet.
It's golden octet because the maximum value in each set is, too to the eighth. Power minus one,
because zero can be assigned is in value.
In other words, 255 is the maximum value that can be assigned in each octet.
So 255 in binary is 11111111 or eight ones.
Most of you have knowledge and experience with this, so I'm not gonna go into too much more detail about it.
The process of sub netting is usually one of the first mathematical encounters that network administrators must learn. It's kind of a rite of passage.
At its heart. Submitting is simply an address. ING methodology that allows network admin is to determine which portion of the I P address is the network and which part is the host.
They do this by assigning a combination of I P address and sub net mask
in many lands. A common sub net mask for each villain is 255255.255 dot zero.
This tells you that the 1st 3 octet of the I P address determines the network, and the fourth is the host,
so every network device in that villain will share the same 1st 3 octet. It's such as 1 92.1 68 that one,
and each device on the network will have a different and unique last octet
in and map. It helps to understand all of the different private addressing schemes and how to determine what network you're scanning from.
And Windows. You can determine your network by running an I P. Config at the command. Prompt and looking at your I P address in sub Net mask
in Lennox UNIX, including the Mac OS. You can determine it by running. I have config from a terminal.
One really important thing to understand and map is that the only way to determine a device is physical address where Mac address is by sitting on that network.
In other words, there really isn't a way to determine the Mac address of a remote host without having administrative privileges to the router or switch that that device sits on.
The only exception to this is when you're scanning station sits on a span or mirrored board.
C i. D R or cider stands for classless inter domain routing
rather than bore you with why it's called that or many other details, I'll boil it down to one simple thing.
Cider notation is an Ivy address, followed by a slash, followed by a number that represents the number of bits used to represent the network portion of the address.
In other words, the number after the slash is a simple representation of the sudden it mask.
So using our example from the previous slide 255.255 dot 255.0 is three octet. It's of eight ones, or 24 bits,
or another example would be 255.255 dot 0.0, which is simply the same as two objets of eight ones.
So an I P address, such as 1 72.16 that 1.0 followed by a slash 16 would be the same
as that i p address with a sub net mask of 255.2550 dot zero
an end map, you can use I p address in Southern notation as a target.
The great thing about doing it this way is that is quick,
and one of the reasons we're going through all of this background is to learn ways to write efficient and map scans.
If you don't fully understand cider notation, I suggest learning it.
You'll be happy you did.
D. N s stands for domain name system.
Deanna's translates names to I P addresses
a scene earlier. In this course, you can use a fully qualified domain name such as scan me dot and map dot warg as a target for a scan
by default and map will use your computer's name servers. When running a scan,
however, you can tell and map what name servers to use for a scan. In other words, you can use alternate name servers.
This is helpful in case you either don't trust your own name servers or if you want to see if there are differences between the way your name server resolves names relative to other name servers.
When obvious reason you might do this is to see if a computer network or D. N s server have been compromised by an attacker.
Understanding the way D N s works can really help you when using and map
in the short lesson, we talked about the TCP I P version for protocol suite with a focus on relevance to end map.
We started with a discussion of IBV four.
We then talked about I'd be addressing.
We moved on to cider notation and we finished up with name resolution.
Thanks so much for walking this lesson with me and I'll talk to you again in the next one.
The network mapper (NMAP) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal.