Time
2 hours 24 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
everyone Welcome back to the core. So in the last video, all we did is we ran a quick H paying three scan, and what we found was the ports that responded to us again. A lot of those were common ones like FTP in SMTP
00:12
and this video. We're just gonna run a quick acknowledgement scheme with H being three. I'm gonna start off by just clearing this screen in the background there, and then we'll go ahead and actually type in this command right here.
00:23
So clear the screen as usual. We're just gonna type in clear and then press enter and you'll see that'll clear up all that stuff in our way. You don't have to do that each time. I just like to keep things a little prettier for everyone to view.
00:36
All right, so now we're gonna type in this command here, so h paying three. We're gonna put a space, and then a dash nor Casey Ah, space. The number one space dash capital V isn't Victor space. Dash lowercase p again. Specify airport number space 80 for the port number that we want to scan against space National case s.
00:55
And with that were specifying. Port number 5555 is our port that the scan is coming from. And then a space and then a dash capital a two run our acknowledgment skin. So a lot of stuff there. We're just gonna go step by step typing this in so everyone can follow along.
01:11
So we're gonna type in h Ping three.
01:14
We'll put our space. We're gonna put dash lower case C space in the number one,
01:19
so dash lowercase P's see. Excuse me. Space cap escape. Space number one, not Capital one. Another space there. And then we're gonna type in our cap dash Capital V, and then we'll type in our port 80 here. So dash capital V space dash lowercase P space 80.
01:38
Let's go in tight. That it now? So, Dad, capital V
01:42
Space dash, Lower case P space in the number 80. We'll put another space,
01:48
and then no one is gonna type in dash lower Case s and then a space. And then 5555
01:55
So dash lower Case s space and then 5555 Almost like that. Those Hollywood movies, you know, where the dial like 5555555 You know, whatever for the phone number. We're kind of doing a similar thing here, but not quite as in depth as a phone number.
02:07
All right, Our last thing here, we're just gonna type in the dash Capital K and then r i p address.
02:14
So we'll just put a space here
02:19
in the capital a dash capital A and then our i p address again, which is one attitude at 168.0 dot one. Again, that's our servers are P. Lab seo one server. Once we type that and what is gonna hit enter on the keyboard and might take a moment to run this particular skin. So I'm gonna pause. A video will pick things back up once I've got the output here.
02:38
All right. So, actually right As I was watching, positive you it went super quick this time, which is actually a shocker. Normally takes about 10 to 15 seconds. Eso we already see that I have results on my end. If you for some reason don't have results on your end or if you get in your message, just double check your syntax. A cz we see mind took literally a second or so to run, and so it shouldn't take too long on your end.
03:00
All right, so let's go to our lab document here. We just have one question here. What is the percentage of packet lost in this particular transmission? So we see that one packet was transmitted. One factor received. So what's our percentage of packet loss?
03:13
All right, so that was an easy one, right? That was 0%. And we could easily just tell that even if that wasn't showing here, we could tell that by one pack of being transmitted one packet being received. In most cases, that should show us that there was a 0% packet loss for that particular item.
03:27
Are. So in this video, we just talked about quickly. Three acknowledgement skin. We just took a look at our percent of packets loss on this one. And then we're just gonna move into the next video. We'll continue on with H Ping three

Up Next

Scanning, Enumeration, and Vulnerabilities

This course covers basic scanning, enumeration, and vulnerability scanning as part of a penetration test.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor