3.27 Mapping Network Lab Instructions Part 4

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

19 hours 55 minutes
Video Transcription
I welcome back to the course. In the last video, we went ahead in and worked on installing that manage engine up manager. Now, I went ahead and Paul's the last video right before I launch to read me file. Have you read me file? Um, it's going to read me file, but I instructed you guys to go ahead and just launch it. So if you haven't done that already,
this go ahead. Include, make sure the check box is checked and click finish
to go ahead and launching an inner explorer.
So, in this lab, what we're gonna do is we're actually just gonna go ahead and configure manager and go ahead and run with the tool
you'll see here. It automatically starts initial logic modules. And that's why I held off on launching it. The read me file on my anything. So you'll see here that the remote file Excuse me? Read me. File down here has been launched,
and that is going ahead and initializing the modules.
So once it denotes initialize, the modules go ahead. At this address in the bar. Generally, it's gonna just default that in there for you, But if it has not done. So go ahead and just put that in there. And the address bar on press enter.
Well, that's gonna do is give you log in page. It takes a minute. Thio initialize Everything here is We're just gonna kind of let wait on that and let that get going here.
And once he gives you the log in page well, actually, just go ahead and log in, so it's gonna be the same username and password by default. So if yours has already launched and gotten going there for you and you're welcome to move on all the way to step seven of your username password,
um, and getting log in there.
So we're gonna keep waiting here while this initialize is again, it's gonna take a little bit of time to initialize and get this on your local environment There. It's gonna depend on what you have set up and how, How much memory, How what kind of processor you have? Basically, your systems is gonna depend on your system. So in the cyber lab, just take a minute or two
to get this all the way initialized.
So again, operators was just another tool that we can use just a map out our network. And really, the benefit of that is kind of keep us a little more organized. Of
what is what on the network that we're mapping out in targeting on also, let us understand. You know what give us a basically a simple way to get the information we need and put it in a visual format. Again, it benefits customers as well, because if they're looking over our shoulder for some reason during the pen trust weekend,
pull up, you know to like these
and just run it real quick and say, Look, you know, this is what we see on your network, etcetera, etcetera. Most people will. Most customers will be impressed by something as simple as that.
So it is taking a little longer than normal here. But we're just gonna be patient and let it get going here.
So again, when we did Zen map, we just talked a simple command in, and it spit out the information we needed. So this one's a little more cumbersome in the aspect of we need to configure Cem different things, et cetera.
Now, in the next lap, we'll talk about the the end of this video as well. But we're gonna start off with the banner grabbing in that lab as well. So basically all these last we're doing are helping us Was scanning the network and the enumeration of the networks were basically enumeration is mapping out the network and understanding where each system is. So
you know Hey, there's a fire wall over there.
There's a you know, a certain web server over there. There's, you know, data server over there, etcetera, etcetera. So that just helps to smack that out. So you see, here finally has finished initializing for us. Now we have Step 60 log in page. So step six and seven. Just go ahead and log in. It's gonna be the exact same
user name and password, So just admin all over case in the same
for the password. So obviously, on this we don't care about security because we're using a default password. So I take a second photo log in. Now I do want to mention it. I do mention to hit the escape key. If that doesn't work, click on the take a tour button
and then you should be able to escape So that's what I'm gonna do, because I've done this several times in the cyber labs and it has not worked by just pressing escape right here. So I'm gonna go ahead and take the tour.
It's gonna pop that open, and I don't care about that. It's gonna x out of that s O now should let me escape to exit the tour.
So it's gonna give you this pop up here next. Once you hit, escape and exited, just go ahead and close it out. We don't care about that.
So go back to our lab document here. So we've we've escaped it again. You may need to click take a tour like I did. And then cook escaped to get out of it.
And then you also want to click the monitor I t on the go. That was that guy looking at his phone. Papa box Grand clothes as well. So now we're here. We're at the op manager Admin page.
So under this discovery input where? Defaults to under the start I P address. We want to go ahead and put this start I p address in. And then we also want to put our end I p address right below that. So in this one, we're gonna type in one and shoot at 168.0 dot one and then we're gonna also type in for the end. I p
we're gonna tap in 1 92.168 dot 0.255
So let's go ahead and do that now. So 1 92
0.0 and then when you just have a single digit there or anything less than the full three digits, you just wanna either tab or just click in the next box to put the next
of number of the I P. Address. Oh, here, You'll see. Based off that And defaults wanted to shoot at 168.0 for us. And then we just type in 2 55 in the last box there. All right, let's move back to our lab document here.
So now it's step number 12. We want to scroll down to the page and click next, So we're just gonna click next. It's right here.
Our next step here is gonna click this ad credential, but we're gonna go ahead and click on that.
She'll see here. Step 13 is to add a credential.
Might take a second to pull up, and then we're gonna choose the windows. W m my credential. So it's gonna be this one right here on the left
green. Click on that. So now in the name box,
we're gonna type
Windows space credentials. So let's go and do that. So Windows
space credentials. So with a capital W and a capital C,
we don't worry about the description area
now, in the domain name,
we're gonna use practice labs dot com Oh, Capital
Backwards Slash and then administrator with a capital A. So we're doing practice labs dot com all capital and then backwards slash administrators. Let's go ahead and type that in.
So practice
labs dot com again, all capital
backwards slash
with a capital A
All right, So let's move on to our next one here.
So in the password, we're gonna type the word password
with a capital P and then that zero, So not a capital O. And then we're just gonna confirm it in the next box. So let's go ahead and do that. So capital P
lower case n e s s w zero party, and then the next box here, we're just gonna talk the same thing. Capital P A s s W O r D.
Excuse me. When I re typed that capital P lower case A s S W zero party.
All right, then, just click on this safe, but in there.
So now we're at the Discovery Credentials page. We're just gonna select the public check box next,
And our next step here is clicking the Windows credential check box. And then now we're gonna click next after we do that. So let's go and do that. We'll cook next. Here.
All right, So under discovery rules, now we're gonna click to ad M s sequel monitors. So let's go ahead and do that. And then we're gonna click on next.
All right? So we can do that there.
Does he have several options here? Let's keep moving on his lab.
So under Discovery interface, we're gonna keep the default settings and just click on next. We're just gonna click on next year.
Now, under discovery schedule, same thing here. We're gonna clean, keep the defaults, and then click on next,
and then under Discovery summary,
we're gonna go ahead and select saving execute. So something with discovery schedule here, we're just gonna click next
and that here, We're gonna cook, saving execute down at the bottom right here.
All right, So devices Discovery, I started successfully.
All right, so we see here, we've selected saving execute. Now we're gonna go back to our manager, because now it should be scanning to map available devices.
So we're going to select the inventory tab on the left side.
Let's go ahead and do that.
We're gonna select inventory here.
It's gonna take a moment to sort of pull up for us.
All right, So you'll see here. It's starting the network of discovery for us.
And now we wanna click on the dashboard for last up here to view the overall network information. So we're collecting a here. We just want to see what's it actually doing? So let's cut back on your dashboard
and again I might take a moment. Soto, pull it all up for us here.
You can be a little slow just because it's actually running the scan, so you'll see it kind of maps out out there for us
if we scroll down,
we can also get information on anything wireless. Many servers, any printers found
we could see the availability eventually of the devices. It's still got a ways to go on the scan.
well, you see, if there's anybody been any recent triggers at all, um, memory utilization, etcetera, etcetera. So there's a lot of different information in here again. Once it runs a full scan here, you'll see many of these populate for us.
So in this lab, we just went over using the op manager tool to scan the network and kind of map out to see what types of different things may be on the network or a part of the network here
and the next video we're gonna talk about banner grabbing. Sze will go into how we can use that in our contest.
Up Next
Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By