Time
9 hours 47 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:02
Hi. Welcome back to the course. And the last video. We finished up our discussion on DNA zone transfers.
00:08
In this video, we're gonna perform a check for live systems.
00:12
Now, the requirement for this lab is gonna be the cyber environment. So I'm using the lab environment for Cyber Re. Now, you can run these commands in your own Callie environment, which I showed you in the initial section how to install that stuff.
00:24
However, we're not gonna cover the particular set up or using the commands in your own environment. So we're staying strictly through the cyber environment on this lab
00:33
in this lab, we're gonna use two different tools. Ready? Use and map in h pink three. And we're just gonna run a couple commands in each on our goal here is to identify any live systems on our target.
00:43
So Step one of the lab logged into the saberi labs, which I've actually already done, and then also step to select the ethical hacker practice labs
00:51
that will bring it to this page here.
00:54
Now instead, three word A select performing a check for life systems lab. So that very top laugh here obviously already completed it, but we're gonna go through the process, so I'm gonna go and click on that.
01:03
Next. We want to click the start button here. That's gonna poke the actual lab for us.
01:07
So you'll see. Step number four was clicking that starting button and then step number five. You want to turn on all the virtual machines now? Minor. All on here. If any of yours were turned off, just cover your mouths over the particular machine and it should say, turn on right up in this area here. Just click that to turn it on
01:25
Here. For some reason, you do Turn it on and it still doesn't pull it up or you get an air message. Just click that refresh button the last option there that should get it going properly.
01:36
So let's go back on our lab document here. Our next step
01:40
is to connect through the V NC viewer to get to the Cali machine. So we want to click on this win 10 decks stop, which I've already clicked on here. But to click on any of these machines here, just put your mouse cursor right over the name. They're just click on that and that'll bring it to this particular machine.
01:56
All right, so we're gonna double click on that to open it up. So let's go ahead and do that now.
02:01
All right? So you see a little pop up box there,
02:05
So step number eight tells us that the viewer launched what you did here.
02:07
Step number nine. We want to type the address of the Cali machine now, generally, by default, it should just populate that I p address in there for you. And we see that does match what we have in our lab document here.
02:19
So we're gonna move on to step number 10 and just we're just gonna click the connected button.
02:23
So this button at the bottom right here, just click on Connect.
02:27
Now he's gonna ask us for a password.
02:30
So we see in step 11 we see the password here. Now, this is a zero right here, not a no.
02:37
So we're gonna go ahead and type in the password.
02:39
So Capital P and then lower case A s S w the number zero and then a lower case R in a lower case D on. Then either hit Enter, it is click. Okay.
02:53
and it's gonna start pulling up the Cali box. It might take a moment of Soto pull it up all the way there. If you get this little air meshes, just say okay to that. There's nothing you have to worry about in this lab.
03:05
All right, So now you see just a notation there that we should see the Cali desktop. So in this lab, we just wanted to go into launching our Kelly desktop, and then we're in part two of the lab. We're gonna learn how to look up the I p. Address of our Callie machine.

Up Next

Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor