2 hours 24 minutes
everyone Welcome back to the course. So in the last video, we went ahead and made the modification to our windows firewall, so we basically just turned it on. And then we ran another acknowledgment scan to see the difference in results. So again, after we turned on Windows firewall, we got filtered for port number 80 as our results.
Now, I mentioned in that video that we would need to reset our server machine just because the configuration change. Sometimes we'll lock it up for us. So we're gonna go ahead and do that Now, before we get started in with eight of these of this particular lab where we go into H paying three. So let's go and do that now. So the way we're gonna do that and I'll pause the video
once I've reset it because it will take a moment. Come back up.
We're gonna click on the P lab s a 01 and just click the reset option right here. It's gonna prompt us and say, Hey, you know, Are you sure you really want to do this? We actually do. So we're gonna say continue now, as I mentioned, it's gonna take a moment, so to come back up. So I'm gonna pause the video now and then what will need to do?
We'll need to launch the Apache service again. Kind of like we did it in the very start.
We'll need to watch that again, and then we can move through the rest of our lab.
Everyone, welcome back to the core. So what we did was we just pause the video there as we refresh her a reset or P lab essays or a one device. You'll notice sometimes that you'll get this message here. So I want to show you this as well. If you get the Hey, this device is not connected here at the top, right? There's this little lightning bolt looking icon
this click on the reconnected device and it should pull up the device for us. When you see it
happens pretty quickly there. Now, as I mentioned before, we have to go turn our Apache Web service is back on. So we just close our server manager a window like we did before. So just x out of that and then just click here in our example icon that's gonna launch it for us
and then we'll just make sure everything is turned on and then we'll be able to go back and continue with our actual Lao. So just click start on all those, and then we could just go ahead, Minimize said. Now we're gonna click back on the P lab, win 10 machines, or just click on this one here
and you'll see we're back in our terminal window.
So now what we're gonna do is we're gonna type in this age, paying three command right here.
So again, we're just basically specifying that we're gonna do the scan. We're gonna do this port range here that we're gonna do it basically a sin scan of this particular I p address here.
So I'm gonna actually type the clear command here just to make it a little prettier on my screen. So this clear and enter will clear up all the commands and everything you've done in the terminal so far. And then it takes you back to the initial prompt with everything else cleared out.
So we're to start off by typing in h paying three.
We'll put our space that we're gonna put the Dash eight and then we're gonna put a space and then 0 to 5000. So let's go and do that now.
So Dash eight and then 0 to 5000.
We'll put another space there,
and then we're just gonna finish out with our dash Capital s a space and then our i p address right there.
So Dash Capital s facing that our I p address
and then what? You type that in? Just go ahead, hit and turn. Her keyboard here might take a moment or so to pull the scan and finish it out. So menopausal video briefly. And then we should come back shortly.
All right, so we see we have our results of our scan and you'll see that as we had learned before, with h paying three, we had seen that this particular scam produces all these clothes, birth ports or ASU's reports or not responding ports. But let's stroll back up here
to the top, and we're gonna take a look and see what ports actually responded to us. Because that's a question on our lab document. Here
and again, these lab documents are available for you to download in the supplemental resource is section so if you haven't done that yet, for some reason, definitely be sure to do so. We've also included some other helpful information as well to help you learn scanning a little better.
And it's always as we're as I'm screwing up here, because it's gonna take a moment with all of these poor numbers we found.
As always, you can always take the longer version. So if you actually are prepping for either the CH or pen test plus, it's and you could take the longer versions that are specifically targeted towards the certification exams now, as he as of the filming of this particular video, Siri's tthe e pen test. Plus, it's not a course on our site,
um, simply because I haven't taken
the examination, but I will be, and just actually a matter of weeks here,
so that course will be coming out. So if you happen to watch this before there's a pen test plus course coming out, just know that at some point the future there will be a pen test plus prep course coming out on the website.
All right, says we scroll back up here. We see that there are some reports that have responded to us so you can take a look on your side as well, and we'll see that on my side. We do have support numbers here. So what ports responded is our main question. So you can just jot down the different ports. So, for example, we see https pop, three
finger SMTP ftp etcetera. So a lot of the common ports that you might see
are the ones that usually respond.
All right, so this video, we just ran a quick H paying three command, and we'll continue on with the next video. Now, we don't have too many more videos left for this particular overall lab, but all these are just little snippets, as I mentioned before of scanning tasks that you might do during a penetration test.
Scanning, Enumeration, and Vulnerabilities
This course covers basic scanning, enumeration, and vulnerability scanning as part of a penetration test.