Time
23 hours 21 minutes
Difficulty
Intermediate
CEU/CPE
23

Video Transcription

00:02
Hi. Welcome back to the course. In the last video, we talked about installing Zen map, which is a graphical user interface or gooey of en masse.
00:10
Now, if you haven't done that, you go and pause this video, go back to the previous video and get that installed because you will need it in this video.
00:18
So if you already got it installed, this go ahead and get started. So make sure you're connected to the Windows 10 machine here in the cyber lab. So the P Lab went 10 and then we're just gonna double click on the Zen map icon on the desktop.
00:29
It's gonna open it up for us here. We'll see some different things here. We're gonna pay attention to this command. We're gonna go and type in a command here. So the command we're gonna type in is gonna be n map space Dash, lower case sn. So we're basically disabling port scanning, and then we're gonna do another space and then put the I P address range of what we want to scan.
00:48
So we put that in this command box here, So n map and then we'll put Dash S n all over case space and then 1 92
00:56
0.168
00:59
0.0 dot one and then the Ford Slash and then the number 24
01:03
and then just press enter under keeper.
01:07
It's gonna take a little bit of time here, but it's gonna start scanning.
01:11
Let's go back to our lab document here. So once it finishes scanning, we're gonna click on the topology cab just to see what that looks like. So we'll give it a little bit of time. You're takes a minute or so to run,
01:22
and then we're gonna click on the topology tab. We're gonna see what kind of results were getting here.
01:29
There we go. It's starting to spit back some results here. You'll see it shown us a different host or up here. And so let's click on topology now
01:36
and see if we get anything at all.
01:38
So there we go. So we see we do have a little bit of a topology here so we can grab onto these and just drag him in any direction that we want to.
01:46
And you see, it also was gonna list out those I P addresses for us
01:49
so we can drag it around, especially just gonna redirect the point
01:53
portion of it here.
01:56
Let's go back to our lab document here. So we also next want to select the fisheye taps. Let's go ahead and do that. So the fish I have right here
02:05
All right, so that's expands it out a little bit for us. And again, we could just change the polarization of this.
02:10
Whichever I p address where? System That we want to be kind of the lead there. Or a reference point. We can adjust that here.
02:19
All right, let's move on to step number six. So we've already done that. We click and drag any host point. We're basically changing the focus for the view.
02:25
So next step we're here, We're just gonna click on control so you'll see here we have some different options of how we can zoom it in or out
02:34
to make it bigger or smaller, depending on what we want to do here. This is especially beneficial. The larger range of your scanning here, you can dissect and see exactly what you're getting here.
02:46
So this video was really just kind of a quick video on looking at what mapping a network might look like again. You see here, it's given us a visual output, so we can kind of see like, Okay, this system is here. This machine is there. We can get a generalized idea of what the network looks like at a visual level.
03:04
So in the next video, we're gonna use a different tool to go ahead and map our network. We're gonna use the manage engine off manager. So we're gonna go ahead and get it installed, and that will actually run it and use it to see what that looks like.

Up Next

Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor