3.22 OS Fingerprinting Lab Part 2 EH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 47 minutes
Video Transcription
Hi. Welcome back to the course and the last video. We want overusing and map to perform active operating system fingerprinting. So we had to Target Machine's on. We found out that both of those happen to be running Windows operating systems
and this video we're gonna talk about out of tool called p zero f. So this allows us to do some passive operating system finger pretty.
So let's go ahead and get started.
So we should still have our cyber lab opens. We're gonna actually connect to
the server. Soapy lab s a 01 So let's go ahead and click on that, and I'm already connected to a here.
Now, if you get that server management window, open the server manager window. Glenn, just close that out.
Our next step here is the scroll to the bottom and click on our little example Icon here, this little orange icon,
we'll cook out and get that going.
So what that's gonna do is that's gonna enable Apache Web service is the Apache Web service is gonna be running with a D V W way, which stands for *** vulnerable level application.
I'm just gonna be running on port number 80. So
here it is. It's started to be enabled here, So let's now move on to our next step of her lab.
So Step number four were kicked neck back to our Windows 10 machine,
and then we're gonna connect in tow. Are Callie Desktop?
So let's do that. Now click on our Windows 10 machine.
We have our Kelly desktop here, so I'm just gonna open the route terminal. So remember, we double click on it. Open it up,
and it should open. There we go.
All right,
so now that we've opened it were to type this command here, so we're gonna type p zero f so p lower case, zero lower case F
A space dash, lower case p Another space, a dash. Lower case I space and then e t h. Zero.
So what we're doing here is the dash. Lower case P is putting the listening interface into promiscuous mood. So basically, it's going to send everything
and then the dash lower case. I actually lets us listen on the specified interface. What's that happens to be The Ethernet zero interface
are so let's go ahead and type that commanded here,
So p lower case
the number zero lower case F
space dash, lower case P space test. Lower case I space. And then finally, our Ethernet
interface. So lower case e th in the number zero.
So we're gonna go ahead and press enter here.
Now, this is gonna just kind of hang tight in the background. Our next step is the double click on this fire Fox, E s R.
Right inside of our Callie desktop. So good. And double click on that.
It's going to open it up for us.
What? Let's doing that. We're gonna take a look back on our lab document here. So we see Step number seven is opening Firefox. CSR. I'm gonna double click out again. Doesn't look like it's opening. There we go.
And the step number eight is just typing this i p address into the address bar.
So let's go ahead and do that. Now
we're gonna type in here 1 92.168 dot 0.1
and then just press the enter key there.
All right, so that's running there. We're gonna maximize our terminal window again in Cali.
Might take a second to pull up here But you'll see now that we're actually getting a scan done. You see, we got some responses here,
so let's take a look back at her lab document.
All right, so we see that it is capturing some packets and stuff like that.
And so do you. Do we see any signage, knowledge, mint packets? And then also, do we see any operating systems listed? So I do see some operating systems right off the bat here with Apache stuff like that. So let's keep going back up here.
We're just gonna see if we notice any signal. Acknowledgment packages. Also, we do see, here we have another operating system, Windows seven or eight, that it might be running here.
And if you check right here, we do. See, we have a set acknowledgement packets. So let's go back to our lab document.
So do we see sin at packets? Yes, we do.
And we see operating systems listed. You will? Yes. You know, right there. We do see that we have Windows seven or eight.
So we're not just gonna put 78
Let's just scroll around here a little bit. Just screw around on your end there and see if you notice any other ones at all.
I'm just gonna come back up here. So I do also noticed something. When it's there,
we'll see if we notice anything else at all.
Now, since we're running this against some machines here in the environment, we should only see Windows Analytics. We see Windows seven or eight again.
Yeah, well, keeps growing up. We see Lennox again. So we're just gonna go with those ones there. So we're gonna come back to our lab document and then just type in linen.
So what the benefit of this tool has done is it's allowed us to see the operating systems for our target machine, so we don't get an exact science, right? So it says Window seven or Windows eight, based on the properties that it's recognizing. However, that does allow us to know that. Okay, the running windows.
And what kind of vulnerabilities do I know of for window seven or Windows eight or Windows 8.1.
And the same thing with Lennox, you know? So here's a version of lyrics they're running on, and so,
you know, it doesn't tell me what particular aversion doesn't tell me Abou Do or Debian or anything like that ex husband minutes. However it does show me that is the running lyrics. And maybe I know some vulnerabilities for that or some, you know, zero days that I can use to exploit that. So the benefit here of operating system fingerprinting is to basically allow you
to see
simple vulnerabilities that you might be able to take advantage on the target machine.
So in this video, we went over the tool p zero f, but we did some passive and active. There's gonna be some passive fingerprinting with that tool. We're able to see that we can find some limits and some Windows operating systems on our target machines
and the next lab we're gonna jump into mapping networks.
Up Next
Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By