8 hours 49 minutes
everyone. Welcome back to the core. So in the last video, what we did it's a quick acknowledgement skin. So again, we just ran that against our server I p address. Now what we're gonna do with this videos, we're actually gonna go change some windows firewall settings, and then we're gonna run a scan against it. Now, one thing I want to mention in advance is once we make these setting change and make kind of lock up
the virtual machine and so will want to reset it before we move on to the next
lab video so we can complete the task in those laps. So just f y I on that? Just something I discovered during testing. Not a huge issue. You know, if you've ever worked with virtual labs environments in the past that you know are hosted or something, you may have little glitches like that, and that's perfectly fine.
All right, so let's go ahead and get started. So the first thing we're gonna do is actually connect to our server machines. So the P lab s a zero. Wants to just go and click on that. That's that top machine there. You can minimize this control panel here for the exam.
We can minimize that down.
And then what we're gonna do is we're gonna search in the start menu. So we're gonna right click on the start menu. We're gonna search for firewall dot CPL on basically, just click okay. Or hit the enter key in her keyboard and that will go ahead and pull up the windows firewall for us.
So we're gonna right click, go to search,
and then you fire all.
Excuse me. We're gonna go to run
quick on the wrong one there, and we're going to firewall dot c p l all over case. And then again, you can either click okay or just sit and turn her keyboard and you'll see it'll pull it up for us here.
All right, So our next step here, really click here in step six word and click where it says turn windows firewall on her off. So it's right here on the left side of your screen,
and then it gives us some setting options that we can change.
So what we're gonna do now, Step seven is you're still in us that we're looking at this particular screen in the background there. So now what we're gonna do is we're gonna under this top box here. We're gonna check the box next to block all incoming connections, including those in the list of allowed APS.
So we're gonna click that check box right there, and then we're gonna do here this bottom boxes, click the turn on one, this firewall, and then check that same type of type of block right there.
So that's all we're gonna do here. So those are the two setting changes that we haven't steps eight and nine, and then we're just gonna click okay to save the changes, and we're gonna go back to our Windows 10 machine and then just run our same acknowledgement scan that we did earlier. We're gonna run the same command again,
So let's go and do that. Now. We're just gonna say okay to that.
Go back to our Windows 10 machine,
and if we stayed on this server machine, we would see probably in their message here in a moment. But we don't care about that. We just care about coming back here and running our command
so we can type in this command again if you want to. The easiest way to do it is just pressing up arrow on your keyboard and you'll see it'll pre default. All the information we just typed with last command. We talked in there for us.
And if we went, you know, if we did the, uh, pero some or we could go back to the previous commanding center.
So here's our command here. All we have to do now is hit the enter key on your keyboard and it'll go ahead and run that command.
Now, as I mentioned before, it takes a moment or so to run this. So I'm in a positive briefly, and once it comes back up with results, I'll go ahead and start the video again.
All right, so we see that I have my results on the screen again. If you haven't gotten your results back from the skin going impulsive video, just wait until you get your results.
But we have one question we want to answer here in our lab documents. So now if we're looking at Port 80 is showing us filter unfiltered, remember before and showed us unfiltered.
So let's take a look here outputs. We see again the second line from the bottom. There, we see that it's now showing as filtered.
All right, so if you think back we changed with this firewall setting, we actually turned on Windows firewalls. And now it's filtering stuff through that particular firewall on the host machine there. And that's why we're showing filtered as our output here inside of Cali. Lennox.
Right? So in this video, we just made a quick firewall setting. We basically turned on Windows Firewall. And then we went ahead and rented another acknowledgment scan to see you what kind of difference we had gotten in the results. And we noticed that now it's showing is filtered, which makes perfect sense because we just turned on the fire.
All right, so we're to continue on in the next video with additional scanning lap
Penetration Testing and Ethical Hacking
To assess the strength of your organization’s cybersecurity posture, you need to gather information, perform ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
Offensive Penetration Testing
As a pentester, you need to understand the methods of real-life attackers and use the ...
22 CEU/CPE Hours Available
Certificate of Completion Offered