2 hours 24 minutes
Hey, everyone, welcome back to the course. So in the last video, we just ran a Christmas can again. A Christmas can is only gonna work on a clinics machine. So if you see that on any type of certification exam, you'll know the answer now.
So in this video, we're just gonna do another and Matt Command. So we're actually gonna close our Zen map tool and we'll go back to our command prompt.
So the way we could cause us out just x out of it at the top, right? It's going to say to you, You know, you Hey, you have one saved changes. We don't care what you want to close it anyway.
And then we're gonna go back to our V NC viewer and just maximize that against you. Just click on the little Tigers. I might take a moment, so since has been a minute since we've used it. But then it will take us back to our command prompt here.
All right, so let's go back to our lab document here.
So now we're just gonna run an acknowledgment scan. So again, that's why you need to understand the TCP three way handshake for this entire course to understand that we send a sin pack, we get an acknowledgement and its impact back, and then we end out with an acknowledgment to establish our three way handshake. Of course, there's more things involved in there, but that's kind of a generalized high level over you.
All right, so we do have our Kelly route terminal opens. We're actually ahead of the game here. All we're gonna do a step four here. We're gonna type in this particular command at the prom.
Now, what we want to do here in what we're specifying his port number 80. So we want to find out. Is Port 80 filtered or unfiltered? So that's kind of our goal with this particular lap.
So let's do that. Now. We're to type in and map space Dash Lower Case s Capitol, a space national case p
to specify the port number and then space 80 to specify that we want Port 80. And then we'll finally end up with the space and then our i p address. And we want to scan against again that if you recall from earlier, that's our server I p address.
So let's go in tight that it now. So we'll type an end map,
dash lower case s capital a
space dash lowercase P
Space 80. And then again, a space in our I p address of 1 92.168 dot 0.1.
All right, and I always like to double check myself. I know I talked that correctly, but always just make sure that you're typing the correct command in so you don't get an air message if you get an air message. For some reason, it usually means you fat fingered something and just double check yourself and go back and correct it.
All right. Once you type that and just go ahead and hit, enter the keyboard, it's gonna go ahead and run. The scan here might take a moment. So someone a pause, a video here usually takes about 15 to 20 seconds. I'll posit video will pick it back up once I got some results.
All right, so you see, I've got my output again. It takes, you know, anywhere from 10 to 15 seconds, possibly a little longer, depending on your connection. But let's go to our main question that we had on our lab document here. Question number one is port number 80. Is it filtered or unfiltered? So if we look at our output here, you'll see the second line from the bottom shows us port 80 there.
And we see that it's unfiltered in this situation.
All right, so in this video, we just ran a quick acknowledgement scan again. You could do things more in depth. Look, we could put an actual range of I P addresses there if we wanted to, but we're not gonna do that for this particular lab. I just want to keep it simple for you. But also keep in mind that these are all particular task that you want to know and understand how to do when we move into the assessment phase of this particular course.
Scanning, Enumeration, and Vulnerabilities
This course covers basic scanning, enumeration, and vulnerability scanning as part of a penetration test.