3.25 Mapping Networks Part 3 EH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 47 minutes
Video Transcription
I welcome back to the course. In the last video, we talked about a tool called Zen map. So that map again is a good reversion Orga graphical user interface version of en masse And what we did with that to read it. A simple command of scanning a range of I P addresses. And we let it putting out an output so we could see what the network map kind of looked like. And you notice we have different i p addresses.
We played around a little bit with topology
and got to see the different visuals and different options that we could use
in this video. We're gonna go ahead and install a tool called Manage Engines up Manager. We're gonna get it installed in the then in the next video. We're actually gonna go ahead and use it to do another map of the network.
So let's get started. So first we want to connect to
the server. So P l A B D C 01 So this top one here will go in, connected
and off the server manager window is open on here. Just go ahead and close it if it pops open for you and you'll see it's gonna pop up for me. Just go ahead and excited that there
next, we want to launch Internet Explorer to view the Internet page. So we're gonna go and scroll down. You'll see. It's all kind of initiating. We're just gonna x out of those air messages there.
So launch Internet Explorer, it's gonna lost the intranet page.
We next want to go to installation files and then up manager. So let's go and do that. We'll cook on installation files
and then we're gonna scroll down till we see Op Manager.
So I screwed a little too far there.
And our manager, He's right. They're down at the bottom.
We didn't click on that. You'll see It's got the execute Herbal. They're for us. So let's go back to our lab document here.
She'll see it wants us to click on the executed and then just click run. And what that's gonna do is launch a wizard for us.
And basically, we're just gonna go through the license, agreement everything and select that. So let's go ahead and install this first.
So we got our executed. Well, we're gonna say run,
and it might take a moment or so, but it's gonna launch the installation wizard for us.
So in the lab document, I do want to point out we do have a couple of different changes. We will make us. We go through, we'll talk about theres through the installation process
so it does take a moment of soda launch up here for us, and we'll give it a little bit of time here. You'll see. It's still kind of downloading here, and it does take a minute, depending on the speed of your system and depending on the speed of the cyber lab environment or whatever virus you happen to be using, it's gonna depend on that. Speed is not too long here. We've got another 30 seconds or so so
again mapping of the network. This helps us visually.
I kind of see where things are and does give us another way of kind of spitting out the information for a customer to look at it and digest and at the end of the day again later on, of course, we'll go over reporting. But at the end of the day, if a customer can understand ID, then you failed as a penetration tester.
All right, We're just going to say next. There Here's a licensing agreement. You can read it through if you want to. I'm just going to say yes. I agree to that.
We want to make sure we do the free edition here. So if you look back on the lab document, we want the free edition in step nine.
So make sure you choose a free addition the second option there in this same next.
Um, I'm gonna use a linguist language. Excuse me of English, if I can speak it, um and then we're just going to say next here,
leaving us a default installation folder to say next.
So now here we come back to our lab document here.
So at the port selection panel in the Web server box, Well, actually, want type 8443 So let's go ahead and type that here. We want to type eight,
And let's see about net flow. We're gonna leave the default value for net flow. Okay, so then we're just going to say next.
So we'll say next. There.
All right, So now hear it wants us to register the information here. We're actually just gonna ask a skip to this unless you want to put in your information. But what is going to say, Skip?
All right, it's gonna go ahead and extract the files for us.
You see here, Step number 14. The installation of the program actually begins. It's gonna take a little bit of time to extract all those files out. But then it's gonna basically give us an option here for the Select Server mode page. And then we're gonna make sure that standalone primary server is the option that's checked.
So it's going to go in here again. Yours may or may not be as fastest is the one I'm doing here. If using cyber labs, for the most part should be standard across the board for everyone at the same speed.
If here is stalling this on your own environment, of course you will need to have, like windows, different Windows server set up along with Windows 10 or equivalent Best top along with Callie Lennox for some of these labs in the course on, that's why I do recommend the cyber alleged. It's just a lot easier. It comes with everything you need
to run a lot of these. I'll last word that we're doing,
including that quick foot when video that you guys have seen the very first module there of when we crack the password with John Ripper. I did do that on my local Callie environment. However, you can just log into the cyber labs and get all that done. So, you know, save yourself the hassle if you can and just, you know, get that going.
So it's gonna take some time to stop just gonna minimize the Internet page there. Finally, we do have the papa box here that we were looking for it. So let's go back to our lab document here
and you'll see that we're on the select server mode page for step number 15. So the select serve remote page, and then we just want to make sure that the standalone primary where server is picked, which is by default, so we just want to make sure that selected,
So just say next. There.
So now we're on the back end database page,
so we just want to make sure that the post GREss
sequel is selected there. So we see here that we want to make sure that's the one selected.
And then we're just going to say next year.
So you get a little pop up here, you're just gonna say okay to that? We don't care about that.
All right, so now it's gonna give us an option to finish, so it's gonna have them read me check box checks. We're gonna go ahead and I'm gonna actually stop the video right here, because our next step, we're gonna launch the Read Me file and Internet Explorer, and that's gonna be part of the next lab as well. So I'm gonna pause a video here
on your end, go ahead and click finished here so we can start launching,
and then I'm gonna come back in the next video, and I'm just gonna select finished because it's going to start processing and launching the next lab portion that we need to do
Up Next
Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By