OSI Model Lab Instructions Part 2

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

4 hours 21 minutes
Video Transcription
So there's a couple of those couple different, like, kind of intro courses Toe
So I'll jump into the next one here where we talk about some windows stuff.
We'll do a Windows 10 environment, and I hope he doesn't.
That's it for this one.
All right,
So what we're gonna do here is basically just gonna run some different commands, right? So I'm gonna run, like, peeing in that sort of stuff, just gonna show you what that looks like. So
I was gonna right click and go to a command.
So we've got our command window here. Now, all these commands, you obviously don't open like a web browser and say, Ping, you know, you don't say that tracer or anything like that in a web browser, So these are all things done in command line. But as I mentioned, you know, as we have seen in the previous lab there with wire Shark Ping will, she will allow us to ping some type of host
and get information back from. So,
for example, if I want a Ping Google and I'm hoping this
Come on.
Well, apparently, we're not gonna be able to do this, so I may actually just pull it up on my local machine here. If it's good,
cool. So sometimes the labs will just reboot on me. And that's okay. That happens sometimes with windows stuff.
by the way, I am running a Windows Hopes, which is normally a no, no, but this is just a regular computer on running s so we could see that as well. So we'll see if it works. It was kind of innovative for me. I'm hoping it will actually give me a response on Naturally Won't. So I'll just pull it up on my own machine. So please don't hack me. I will say that
we may see some live I p addresses here, and I'll actually changed my p address after this session. Anyway, So it's pink Google real quick.
We'll get our information back. I'm just gonna maximize after everybody to see.
You'll see here where it is pinging. Um, we're not thinking Google. We're picking something else that's actually Google.
We'll get going on this. So, you know this is part of being in America, administrator or engineer, right? Sometimes you miss type stuff. Sometimes you are getting stuff
being able to think on your feet, especially with a lot of people watching. And the intention is very, very important. And by the way, normally, like, you know, Joe mentioned with people watching You don't normally have this many people watching when you're doing stuff. I said, Network engineer. Unless you're trying to demonstrate as a rule to the to the board or, you know, to your boss or something like that, that's when everything decides. So
you'll see here that I got some information back from Google.
Um, you know from that. So the 1st 1 request time. God, sometimes you'll see that with a ping command. I'm not a big deal there.
Real quick interjection can in the in the grand prize. You want to go ahead and up that size on the phone,
And so I will let you direct me, Joe, I've actually never sure if you right click up at the bar on the top, everybody. We're gonna do some live tech support here.
You should open a menu, and then you've got a format and you can change the font size.
Let's see.
Well, this is the fun of There we go. Is that big enough to
Yeah, that should be just fine. Okay, you're making sure everybody can read it for us.
so that's a fun fun of doing stuff. Live way. Get absolute owners. We go. Um, I'm Maura Lennox guy, so I don't jump into Windows Command. Prompt too much. Now, Joe is a habit. I am a Windows guy at heart. You have a lover of Windows. So another thing we can do is and I'm picking on Google here
just cause it's, you know, they've got a lot of stuff like a pig.
We're tracing, tracing, based of the route to Google now, so you'll see some different information there. Obviously I'm using Comcast is it's giving away their So again, don't don't ask me. You got to see some location information. But if we were actually targeting like, let's say we were targeting Google and we're trying to get information about them, we could potentially see where
where the path is going and get information about their systems. Now
you'll see where it's a little Asterix there that might indicate to us that there's some kind of a firewall in place or some other
barrier in place that they're using.
Don't take that long to do the trace, depending on what you're doing in your connection speed and I take a moment or so. But that's kind of where we would use trace route to see the different information. So I call a trace route. It was tracer in windows, but then trace around in clinics. So that's commonly what I what? I will call it the one I'm going to be an uber Lee hacker. You can call it tracer T.
That's a very old reference.
And that's what the cool people call it, by the way. So if you want Thio call a tracer, Um,
I don't think I have a linen, so I don't really want to give you guys my i p address. So we're actually just jump back to the Super to box and hopefully this is the past before.
Very cool.
So we'll see what we can get in this, uh, Lennox box Here is far. She's too, and I have convict again. I don't want to give anyone my i p address. That's kind of you know, security one on one everyone way. Don't want to do that. So what do I have configured in clinics and maximize this.
I don't know if he's that readable, Joe.
It's a little bit small, but I think it's it's manageable. Okay, Uh, now
with the security settings in this particular lab, I'm not actually
able. Well, I don't actually have, like, a aside from, like, my Ethernet card. I don't have like, for example, wireless, Right? So if I had a wireless card hooked up, we would see another
brick of information here that would show the wireless adapter information. But we're seeing up Here is my Ethernet card, and then we're seeing my lube back dress. Basically.
So you know, this one here? If we were thinking that if this was a live Lynette's machine or not in the lab, I'm not in a virtual environment. My actual, like clinics desktop. Then if I was thinking there's connectivity issues, I would probably just ping mei local loop back address and see if I can connected that. If I can. Then Okay, I'm gonna try to pin Google or something next in this kind of trouble
here, I've got an Ethernet address. So if I You know, this is a local I P address again. We're not gonna jump into local public, but this is my local I p address. So this is something that I would generally be using
a different broadcasting a dress to go out to like the Internet, for example. So and that's why I didn't want to give away what my stuff is on my actual computer, because that's the way you can potentially track me back. So I'm in Texas, so tracked me down all you want to, but But as far as I can in my machine, I don't want anyone to do that. I don't think anyone's gonna do that. Maybe Joe,
I gotta watch it and we'll see. Depends on the day. Exactly if it's a good day. It was a good day of Taylor Swift. Then I have nothing.
So that's essentially some of the information we can get with. I have config. We've got other things that Dennis look up etcetera, and that's that and then also are been. So let me just pop back the other command line open and we'll just take a look at
Well, you see here we've got different I p addresses, and I'm gonna have to change my i p address because I did this. But basically, this is a table ing of this I p address to this Mac address, right? So that our table basically stores all that information. So on your networking on on a scale type of thing, the our table,
we'll show it like all the devices under no work. And then the the Mac address is for this to show you the Mac address
in the i p address for Andi. If you know we won't dive into things like are poisoning where I can say like, yeah, this, You know, I p addresses Coming from my machine outside your network is actually this Mac address. And so you think it's part of your network Way will go into that type of stuff, but I just want to touch on that a little bit that Attackers could do that. Can they basically poison this table
and corrupted?
And then they can, you know, use that as a jumping off point inside of your network to do things.
The other thing nets that I'm not gonna run that stat. Just because I don't wanna show the actual TCP ports that are running, so we'll skip that one. So I'll actually wrap up the lab with fat. We'll jump back into our presentation just because I don't want to show specific things on my name,
Up Next
Introduction to IT & Cybersecurity

In this FREE IT and cybersecurity training for beginners, you will learn about the four primary disciplines of information technology (IT) and cybersecurity. This introduction to IT course is designed to help you decide which career path is right for you.

Instructed By