Time
9 hours 47 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:02
Hi. Welcome back to the course. In the last video, we used a tool called Net Cat. And previous to that, we use a tool called Telnet. So we're basically grabbing the banners
00:10
and all the banner grabbing is is just getting information about the target machine and potentially getting information about the operating system running.
00:17
So in this video, we're gonna talk about using end map to do a similar thing.
00:21
So go ahead and access to Cali Terminal window. You should already have it open you again. You contact the word clear if you want to clear out all your previous commands there.
00:30
So now what we want to do. We want to type out this command here. So Step number two here. We want to talk about this and map command so And maps Space dash lower Case s Capital s. So again, what that's doing is giving us that sin scans for the sin packets.
00:46
We're gonna also specify the port, so space dash p to specify the report 80.
00:52
And then we also wanted to run it an aggressive mode here.
00:55
And then finally, we're gonna culminate with our i p address of the target machine. So let's go ahead and type all that in there.
01:03
So we've got N map?
01:04
Yes,
01:06
Capital s
01:07
space National lowercase p to specify airport number space in that sport. 80
01:12
space dash A to run an aggressive mode
01:15
facing them 1 92.168 dot 0.1
01:22
And then we're just gonna go ahead and hit. Enter here.
01:26
All right, so you'll see it's starting and Matt up here, it's gonna be scanning our target machine, and we're gonna see what kind of results would get back. So
01:34
we've got here. Question number one. What's operating system? The target and that. Question number two, What service is we're running on open ports, so keep those in mind here. We're gonna let this run for a second. So we wantto see if we noticed the operating system. And then also, if we notice any types of service is that are running, So let's come back here,
01:52
So I'm gonna scroll up a little bit, and we're just gonna see if any ports are open or not. Okay, so we see Port 80 is open with T C. P.
02:01
Um,
02:02
we're going to scroll down here we see that we've got Apache
02:07
here.
02:08
We also see the Mac address here is Well,
02:12
we see it's running windows, Oso windows. Either 2012 7 or 8.1. We know that's the Windows server that were skinning. There s so we know that's the 2012. But basically it's running Microsoft windows. So if any of these versions have some type of known vulnerability that's beneficial to us, so we can use that and exploit that
02:31
you'll see here we did get a lot of information back. So here we would say that the running windows
02:38
and you could specify from want to you know, if if you want to say that the running server 2012
02:44
uh, with the running Windows seven and 8.1, I think was the other one, there
02:49
s so yes, So Windows Server 2012 or when a seven or Windows 8.1
02:54
and then service is running on open ports. We could see that TCP is running
03:00
on along with h g p c H T T p
03:05
on the port 80 there.
03:07
So in this video, we just talked about another way of banner grabbing. So in this video we used end map. We also use Net cat until night in previous videos. So again, there's a lot of different options out there to do better grabbing. And we're really just trying to get information about the target machine
03:23
and the next lab. We're gonna go ahead and start using some of the enumeration tools out there and just see what kind of information we can gather.

Up Next

Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor