Time
6 hours 28 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
in her last lesson, We were building up to Rogic's in order to capture does custom properties. We had to take a short break. However, let's continue where we left off.
00:10
Now for the I P addresses itself. You. It's very right at Radic specifically for it. And I'm actually gonna open my no pad for dad
00:21
now for the I P addresses itself. You. It's very right at Radic specifically for it. And I'm actually gonna open my no pad for dad.
00:35
Okay, not for eyepiece write. What you want to do is you're gonna have one digit
00:42
indeed. It from 1 to 3 digits, right?
00:45
You ever gonna have a period?
00:47
And this is basically destruct for an I P. And you got that
00:51
four times, right? But only for periods. And if he's copy and paste is in there,
00:58
hopefully should work that. There we go, and then you do
01:02
another coma and he pays another Art does write another. Kuma got there's one poor, another coma,
01:11
nurse the other port and let's leave it at here for now. Okay?
01:15
And this is gonna be our red IX now what you're gonna say, OK, but didn't you just said,
01:22
Why not
01:23
do one reject itself for everything instead of searching for this? Yeah, you could do that. And if you want to do that, what you have to do is then instead of starting from here, you will start with this bracket and then do slash W plus. Sorry. Move every little, uh, space or no space slash d +122
01:45
space or no space and slash de colon slash t to colon slash Z to space. And then the word, right. So the way that works is
01:57
it's such
02:00
mom. And then you're gonna say
02:04
slash w three
02:07
right
02:09
space flash T too.
02:15
Space
02:20
slash d
02:22
two.
02:24
Following. Shouldn't have coffee. There's two more times.
02:28
So the two. D two this is a space
02:31
slash doubly plus slash colon. Right? And if you copy this right in the beginning and hopefully Adam break in
02:43
up to here.
02:46
All right, you shoot now, see everything? Let's see.
02:53
Wants it backwards. Coffee. This first.
03:00
There we go.
03:01
Stretch it so I can see everything.
03:05
And then it should be from here on.
03:12
So let me taste it again.
03:15
Is
03:17
in their theory.
03:21
So let's testes
03:23
if it doesn't work. It's because we mess up the beginning. Right?
03:27
So
03:28
there we go. No sleepless to lead.
03:32
Thes.
03:36
Okay, so we got three.
03:38
You got a space.
03:40
Got two digits
03:43
without a space. We got two digits.
03:47
We got a colon.
03:52
You have two digits.
03:53
You got a colon. You got two digits. You got a space.
03:58
We have a word. We were calling. We got a space.
04:01
So let's do the following.
04:04
I think this is a problem here. If we do this in theory,
04:12
you go see why I wanted to start with the colon, right? Not the beginning.
04:15
And that's weird, Right? This manually, actually. So you can test it
04:19
every game, so you can see we're gonna type exactly the same tree.
04:26
Three. Space,
04:30
two.
04:30
Space,
04:34
two
04:38
colon.
04:41
Two,
04:45
huh?
04:46
Great.
04:47
Cheerio, Colin.
04:53
Two
04:55
space
04:59
word.
05:00
Cone
05:03
space.
05:05
Copy this and put it right
05:13
here. Right. Which is where we had the other one.
05:20
You see, I actually have a never
05:23
room.
05:25
Oh, here. I forgot to break the digit. Okay, so that's the error. I type. I apologize for that.
05:30
Now we know if we actually
05:34
do it like this
05:40
and then
05:41
copy this
05:44
I'm pleased to hear their ego covers everything right. And if you want to add the other numbers in the beginning, and you can actually do it
05:58
and I say one through four, and there we go. Okay. And that's how wretched works. Now,
06:04
we haven't actually captured a field, and that's what we're gonna go to now. And you said I p and we're gonna to source like people. She's gonna beat this one, right? So in this case, let's go back here
06:15
to the Raj ex Rain.
06:17
We're gonna look for this area right here, okay? And you start a captured group before, after the coma,
06:27
right? Which is
06:30
right here,
06:31
right
06:32
after the coma before the did it. So open the parentheses
06:39
and go to the last portion
06:42
and close the currency, which is a captured right, and you can see in the top. It's already being highlight. That's how you know it's gonna work. Have you test? Yes. In matches, Then it's safe.
06:54
Copied is real quick. Before you hit, Save
06:57
not in there,
07:00
it's safe. And now you have a source. I p
07:02
right there. And if you see it now, it's gonna add to violet right here in the top. There's just all kind of a lot of work. Have to do that mentally for each field. Yeah, but technically, already did the hard work. So as you come here
07:15
right and apologise, it's so big now, it's just, like, wasn't able to see the screen earlier. But then you know
07:24
fascination. I p right.
07:27
And what you're gonna do is literally time heretics in there and you can see it's capturing that group. You already know where to search
07:34
on here. Stunt
07:35
first parentheses.
07:42
Here's the part of it. And you can actually have both if you prefer
07:48
right and just changed to capture group.
07:51
And I'll show you how to do that in a second. Okay,
07:56
sorry. That's in the wrong place. Make sure it's before
08:00
the symbol. Okay,
08:05
there. You see, I'm missing one
08:09
of the digits, so let's go back.
08:11
And that's why it's so good to do this here like that. And you can see there is destination I p sir, uh,
08:20
test. Right.
08:22
You see, it's matches and okay and safe. And now we have destination. I p it appears up right. And this is the whole thing I miss mentioning earlier. You have to
08:33
pre of Sands Destination I P.
08:37
And that's because otherwise you will override other destination eyepiece. And once you load it, you can see it right here as well. Now, these seems like a good place to take a short break. See you soon.

Up Next

Building an InfoSec Lab

This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and advantages these tools bring to your network.

Instructed By

Instructor Profile Image
Kevin Hernandez
Instructor