3.2 Manual Vulnerability Assessment Lab Part 1

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour 27 minutes
Difficulty
Beginner
Video Transcription
00:00
to navigate lab, go to www dot cyber dot i t
00:05
click. Browse, then click the link first. Either score lobs,
00:09
scroll through the labs until you find the manual vulnerability. Assessment. Love.
00:15
Ready?
00:16
Let's begin.
00:21
Hi. And welcome to the manual vulnerability Assessment lab provided by Cyber Score.
00:26
First, we're gonna skin the network with an map utility. Go ahead and log in to Cali. Lennox. Username, root, password,
00:32
password within and sign. And a zero
00:42
once logged in. We're gonna open terminal
00:45
going type, and I have config
00:50
notice. Looking at the output that the network is private.
00:56
Now we're gonna go ahead and type and map 192.168 dot 0.0 Such 24
01:03
tea. Quick scan results dot text
01:07
This is gonna give us a text output of what we're looking at.
01:53
Once you have your output, we can go ahead and open the text file.
01:57
You can do this by typing in leaf pad. Quick skin results dot text in an ampersand sign into the terminal.
02:25
Once that tux document is open, we can go ahead and look at the skin. Results
02:30
noticed the host that were discovered
02:32
by looking at the Port ST in service fields,
02:37
you should have discovered seven homes.
03:12
Go ahead and open a new terminal window.
03:15
We're good to go ahead and type and map. Dash B 192.168 dot 0.20
03:22
t 192.168 dot 0.20 Underscore skin results. That text
03:28
this would create a text file over output for the map.
04:00
Go ahead and open the text file that was created by typing leave. Pad 192.168 dot 0.20. Underscores get results that t X t. With an ampersand into the terminal,
04:25
you can see the skin results, including the open ports in the art ping. Um,
04:30
the cell scan. Other
04:32
aspect of the M mob scan report in the text file.
04:53
Back in the terminal window, we're gonna go head in tape
04:56
and map. Dash a 192.168 dot 0.20 t 192.168 dot 0.20 Underscore the less fingerprint dot text
08:45
Once that's done and it can take a little bit, we can go ahead and openness by typing leave. Pad 192.168 dot 0.20. Underscore os fingerprint dot text. Then we can examine the output of the O S fingerprint.
09:28
Now that we're done with this, you can stay tuned for part two, where we identify access to the *** server objects.
Up Next