Time
23 hours 21 minutes
Difficulty
Intermediate
CEU/CPE
23

Video Transcription

00:01
Hi. Welcome back to the course. And the last video. We did a quick since, can with age Ping three. Just to see if we got any results back at all
00:09
in this video weren't into our first acknowledgment scan just to see what's going on if there's any packet loss at all.
00:15
So let's go ahead and get started. So step number one just opening the accessing the Cali terminal window if you don't already have it. Still open
00:23
on the step number two were too tight. This command at the prom. So we're gonna take this
00:27
dash lower case c so we could see the PAC account.
00:31
We're also gonna type the number one
00:34
were type A dash Capital V to make it very verbose
00:38
a space. And then dash lower case p to specify our port number that we want to scan, which is gonna deport 80 again.
00:44
We're gonna also put Dash your case s so that's gonna let us define the base port from where the packets are being sent. So in this case, it's 5555
00:54
and then we're gonna put the dash capital a for acknowledgement flag and then Of course, our target I p address. So let's go ahead and type this in.
01:02
So h Ping three all over. Case altogether,
01:07
we're gonna put a space and then dashed over. Casey.
01:10
A space. The number one,
01:11
a space dash with a capital V. Excuse me
01:17
has face a dash. Lower case P space than 84. Port 80
01:22
space death will lower case s
01:26
space. And then 55 55.
01:29
A space of capital A So dash, Capital eight and then a space. And then then finally, our target i p address for 1 92.168 dot 0.1
01:41
and then we're just gonna hit the enter key to run that.
01:45
All right, so we're gonna go back to our lab here. So what percentage of packet lost transmission. Do we have this question number one here.
01:52
So let's take a look at our results here. Oh, so we see that there's 100% packet loss.
01:57
All right, so we're just gonna type that in there for our question? 100% packet loss.
02:02
All right, so in this video, we went up Acknowledgement scan and the next video, we're actually gonna turn. When does firewall on And we're gonna take a look and see
02:12
what the scan looks like. A TTE that point.

Up Next

Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor