3.24 Mapping Networks Part 2 EH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 47 minutes
Video Transcription
Hi. Welcome back to the course. In the last video, we talked about installing Zen map, which is a graphical user interface or gooey of en masse.
Now, if you haven't done that, you go and pause this video, go back to the previous video and get that installed because you will need it in this video.
So if you already got it installed, this go ahead and get started. So make sure you're connected to the Windows 10 machine here in the cyber lab. So the P Lab went 10 and then we're just gonna double click on the Zen map icon on the desktop.
It's gonna open it up for us here. We'll see some different things here. We're gonna pay attention to this command. We're gonna go and type in a command here. So the command we're gonna type in is gonna be n map space Dash, lower case sn. So we're basically disabling port scanning, and then we're gonna do another space and then put the I P address range of what we want to scan.
So we put that in this command box here, So n map and then we'll put Dash S n all over case space and then 1 92
0.0 dot one and then the Ford Slash and then the number 24
and then just press enter under keeper.
It's gonna take a little bit of time here, but it's gonna start scanning.
Let's go back to our lab document here. So once it finishes scanning, we're gonna click on the topology cab just to see what that looks like. So we'll give it a little bit of time. You're takes a minute or so to run,
and then we're gonna click on the topology tab. We're gonna see what kind of results were getting here.
There we go. It's starting to spit back some results here. You'll see it shown us a different host or up here. And so let's click on topology now
and see if we get anything at all.
So there we go. So we see we do have a little bit of a topology here so we can grab onto these and just drag him in any direction that we want to.
And you see, it also was gonna list out those I P addresses for us
so we can drag it around, especially just gonna redirect the point
portion of it here.
Let's go back to our lab document here. So we also next want to select the fisheye taps. Let's go ahead and do that. So the fish I have right here
All right, so that's expands it out a little bit for us. And again, we could just change the polarization of this.
Whichever I p address where? System That we want to be kind of the lead there. Or a reference point. We can adjust that here.
All right, let's move on to step number six. So we've already done that. We click and drag any host point. We're basically changing the focus for the view.
So next step we're here, We're just gonna click on control so you'll see here we have some different options of how we can zoom it in or out
to make it bigger or smaller, depending on what we want to do here. This is especially beneficial. The larger range of your scanning here, you can dissect and see exactly what you're getting here.
So this video was really just kind of a quick video on looking at what mapping a network might look like again. You see here, it's given us a visual output, so we can kind of see like, Okay, this system is here. This machine is there. We can get a generalized idea of what the network looks like at a visual level.
So in the next video, we're gonna use a different tool to go ahead and map our network. We're gonna use the manage engine off manager. So we're gonna go ahead and get it installed, and that will actually run it and use it to see what that looks like.
Up Next
Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By