23 hours 21 minutes

Video Transcription

I welcome back to the course. In the last video, we got logged into our cyber ladder lab environment. We also launched the Cali machine through Vienna.
So in this video, we're just gonna type in a simple and map command to check for any open ports.
So in step number 12 here, we're gonna type n map space Dash. Excuse me. Space 1 92.168 So N map 1 92 16801
Let's go ahead and type that in now. So N map all over. Case
a space and then 1 92.168 dot 0.1 and then we're just gonna hit the enter key. We're gonna let that run for a moment or so.
So basically what we're doing with this generic and map command here that's gonna basically perform a default since can So if you remember from our lecture on TCP header flags And also when we talked about the TCP through a handshake, we talked about sin packets.
So what? This default scan does his scans 1000 generalized TCP ports at the target I p address, so it may not push back 1000 results, but it's gonna scan kind of 1000 of the most common ports.
So we see Attorney down here. Let's look at our screen.
We see several different ports open here,
and it also tells us a brief description of what it is. So Camaros, different things here.
And then we also have some unknown one. So that might tell us that maybe that support we can use for something, you know, we can get some more information on that port and use that as an entry point and to their particular network.
We can also see what types of other things that might be running, you know, like if they're using L dap or something like that. So if these ports are open, these may be potential things that we can use to exploit.
So let's look back on our lab document here. So question one. Was there any response? Yes, we do see that there was a response and that we see all these different parts are open.
So in this video, which is kind of a high level overview of running an end map command and again we want to see if there was any open ports on our target machine.
The next video were to do the same. A similar thing with age Ping three were to look for any open ports on the machine.

Up Next

Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor