3.6 Live Systems Lab Part 4 EH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 47 minutes
Video Transcription
Hi. Welcome back to the course. In the last video, we went over a simple and Matt Command to basically disabled ports Customs on this network.
In this video, we're to talk briefly about H. Ping three. And we're gonna use one command to help us scan the network as well.
So you should still be logged into your Callie machine. You should have kept that open and have the terminal window open as well.
If not, pause this video, go back to the very first video in this lab section and use that to get the virtual environment launched again.
So step number one. We should be locked into the Cali machine, which we are here now. Step number two. I'm gonna go ahead and take the clear command just to clear up our screen a little bit here. So down at the command, prompt. Here. Just like the word clear. Oliver Case and hit. Enter. You'll see. It's gonna clear out all those previous commands we entered,
and you don't have to do that, but it just helps to be a little easier on the eyes as we're going through this. So let's go back to our lab document.
So Step number three. We're gonna go ahead, type our first command, so we're gonna type all over case H. Ping three altogether and then a space and then a dash lower case h. So we're gonna look at the help summary page,
So let's go ahead and do that Now we're gonna type
H p i N g. The number three, all of that lower case
a space and then a dash and a lower case page on. Then just press enter.
It might take a moment of total pull up. You'll see here. Now, we've got all sorts of different flags and things we can use.
Let's go back to our lab document here.
So now we're gonna take we're gonna move on to step four and type our next command.
So we're gonna basically be running a ping scan here. So we're to type H Ping three again, and then a space and then a dash in the number one.
So that's used to
use Ping scans in h paying three
to run a ping scam. Basically. And so and then we're just gonna type r i P address in there, so let's go ahead and do that.
What is kind of type again? H ping three all over. Case
a space, a dash, and the number one
and then another space will type are actual i p address. So the 1 92.168 dot 0.1 and then just press enter
so again, And I take a moment or so to pull up the information
and you'll see it starts giving us information back.
So let's go back to our lab document here. So do we see any responsible? And this is gonna This will basically run a very long time. So we're gonna stop it in just a second here. So do you see any response? Yes or no?
So we do see responses here
to our Pakistan we're sending now, so go ahead. Just type. Yes. In your little lab document there.
All right. So I'm gonna go ahead and stop this with a control. See,
it might take a second, but it should stop it and bring you back to the command line there.
So in this lab, we just went over h ping three. They're running a simple command to see if we get any response at all to our packets where that we're sending out
and the next section, the next module. We're gonna actually start system hacking. So we're gonna start with our lecture videos, like we did a module three
and then we're gonna move into some labs on the subject.
Up Next
Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By