Time
19 hours 55 minutes
Difficulty
Intermediate
CEU/CPE
23

Video Transcription

00:01
I welcome back to the course and the last video we used H. Ping three an end map to perform a check for live systems.
00:09
In this video, we're gonna use the same tools, but we're gonna perform a check for open ports
00:14
and this initial video, we're gonna go ahead and get our environment set up.
00:17
So I do wanna again state that this lab is gonna be done in the cyber, a lab environment so you can still use these commands on your local machine there. You're a few half of Cali machine set up. However, we're not gonna cover of that particular type of setup in this lab.
00:33
So let's move on to our lab.
00:35
Step number one. We're gonna log into the labs, which already done here, and they were to select the ethical hacker practice labs.
00:42
Step number three. We want to click on the largest, is performing a check for open ports,
00:47
and they were to select the start button.
00:50
So I'm gonna go ahead and back up to that initial page there.
00:54
So step number three
00:56
before me a check for open ports. We go ahead and click on that, and then you'll see a star bright in here. Just click on that. That's gonna launch the lab.
01:03
There you go.
01:03
All right. Step number five. Turn on all the virtual machines if they're not already on.
01:08
And all you have to do is have your mouse over top and there will be a turn on button here if it's turned off.
01:14
If you run into any any issues where you do that and it's not pulling up, just click on that refresh button at the bottom of each one, which everyone's having the problem, and that should clear it up for you.
01:25
Our next step here is we want to connect through the V NC viewer to the Cali machine. So we want to make sure we click on this Win 10
01:32
option here,
01:33
which I've already clicked on. And then we see the DNC viewer icon there.
01:38
So we're just gonna double click on that V NC viewer icon.
01:42
Well, that's gonna open it up for us.
01:46
You're gonna see it puts it I p address there.
01:49
So we see that it launches and step seven. Step number eight. We want to type the address of the Cali machine. So by default and generally will populate it there for us. And we see that that is what we're looking for. We see 1 98 16803
02:04
Colon one.
02:06
So next we're gonna go to step number nine, and that's where we click to connect Button. So let's click over here was going to say, connect that bottom right button.
02:14
It's gonna ask us for a password.
02:15
So the password here is gonna be password, but this is gonna be a zero. So the number zero and not a capital O.
02:23
So let's go ahead and type that in and step number 10. So capital P all over, Case A S S W and then remember it. Zero and then a lower case R in a lower case D
02:35
that either hit, enter on your keyboard or just click the okay button.
02:38
It might take a moment or so, but then it's gonna launch the Kelly desktop for us.
02:45
All right, so we see that the Cali desktop is open for us.
02:47
So step number 11 is just double clicking on that route terminal icon there to actually launch a terminal window for us.
02:53
So let's go ahead and do that now
02:58
writes me. Double click always opened about for us.
03:01
All right, so in this video, we just talked about getting are set up for the rest of the lad that we're gonna do. And the next video, we're gonna go ahead and enter an end, Matt command and see if we could find any open ports. It'll

Up Next

Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor