Hi. Welcome back to the course. In the last video, we used a tool called Net Cat. And previous to that, we use a tool called Telnet. So we're basically grabbing the banners
and all the banner grabbing is is just getting information about the target machine and potentially getting information about the operating system running.
So in this video, we're gonna talk about using end map to do a similar thing.
So go ahead and access to Cali Terminal window. You should already have it open you again. You contact the word clear if you want to clear out all your previous commands there.
So now what we want to do. We want to type out this command here. So Step number two here. We want to talk about this and map command so And maps Space dash lower Case s Capital s. So again, what that's doing is giving us that sin scans for the sin packets.
We're gonna also specify the port, so space dash p to specify the report 80.
And then we also wanted to run it an aggressive mode here.
And then finally, we're gonna culminate with our i p address of the target machine. So let's go ahead and type all that in there.
space National lowercase p to specify airport number space in that sport. 80
space dash A to run an aggressive mode
facing them 1 92.168 dot 0.1
And then we're just gonna go ahead and hit. Enter here.
All right, so you'll see it's starting and Matt up here, it's gonna be scanning our target machine, and we're gonna see what kind of results would get back. So
we've got here. Question number one. What's operating system? The target and that. Question number two, What service is we're running on open ports, so keep those in mind here. We're gonna let this run for a second. So we wantto see if we noticed the operating system. And then also, if we notice any types of service is that are running, So let's come back here,
So I'm gonna scroll up a little bit, and we're just gonna see if any ports are open or not. Okay, so we see Port 80 is open with T C. P.
we're going to scroll down here we see that we've got Apache
We also see the Mac address here is Well,
we see it's running windows, Oso windows. Either 2012 7 or 8.1. We know that's the Windows server that were skinning. There s so we know that's the 2012. But basically it's running Microsoft windows. So if any of these versions have some type of known vulnerability that's beneficial to us, so we can use that and exploit that
you'll see here we did get a lot of information back. So here we would say that the running windows
and you could specify from want to you know, if if you want to say that the running server 2012
uh, with the running Windows seven and 8.1, I think was the other one, there
s so yes, So Windows Server 2012 or when a seven or Windows 8.1
and then service is running on open ports. We could see that TCP is running
on along with h g p c H T T p
on the port 80 there.
So in this video, we just talked about another way of banner grabbing. So in this video we used end map. We also use Net cat until night in previous videos. So again, there's a lot of different options out there to do better grabbing. And we're really just trying to get information about the target machine
and the next lab. We're gonna go ahead and start using some of the enumeration tools out there and just see what kind of information we can gather.