00:15
I do a search reports can.
00:18
Looks like I got some other ones here. I've got word press on external port scanner and act fire. Well, scanner that ax cans help you detect if you've got state for far wall FTP bounce Port
00:33
Do you see peace care?
00:34
The Christmas scanned
00:44
uh, let's. We'll run a TCP scan really quick just to try it out.
00:58
Always remember to show your options. Make sure that we'll see our host is not
01:03
set any longer. That's strange,
01:17
if I show my options and looks good,
01:26
and you see it's a very simple scan,
01:30
this is quick and dirty compared to something like a map where you get a lot more detail.
01:34
But I can define my number reports. I can find how many ports to check it once if you increase the number of the scan may run faster. Increasing number of threads also make the scan run faster because it's able to
01:49
divide the work up into multiple different processing threats instead of just relying on one.
02:00
So doing the difference can types, as I was saying, does give you some good information
02:07
getting a certain details that you need right off the bat something that you want quickly.
02:15
I can also do something like,
02:19
these are just poor containers, by the way,
02:22
so should almost be done.
02:24
I probably should have increased the threats to make this run a little faster, but there are all kinds of other skaters that are looking for specific service's or specific features
02:34
of a hair of a given target system.
02:38
So we're nearly done.
02:44
Actually, I think if I just hit control C, I should be able to break out of that. Okay, good.
02:49
let's do a search for
03:04
All right, so continuing to try to scroll to the top here.
03:08
See, there's quite a few scanners available, and some of these have dates associate with them. We get we have our rankings,
03:16
so that helps you. You know, things like Apple TV image, remote control. There's
03:23
D B to scanning UDP Service's
03:30
Cisco Devices website crawlers drew people.
03:36
I've got HP printers. It looks like
03:39
at five load bouncers
03:43
I I s scans for Microsoft Web servers. J Boss
03:50
open mind message portal Ruby on rails s AP business There's a quite a large variety
03:55
and of course, this list of scanners
03:59
will grow over time because people keep on adding things to the framework.
04:04
SMTP open open relay detection,
04:09
war dialing T f T p brute force viene See, there's a quite quite a large number of of items.
04:16
We know that, uh, that server message block
04:20
was running on the system. So one thing we can try
04:27
I can narrow this down by looking for S and B.
04:32
That still gave me a lot of information.
04:34
I want S and B version. I think
04:38
I want to verify one little piece either there is. So
04:45
zero in on something based on the results of the port scan or Nen Maps can
04:54
run one of these tools. The scanner tool
04:58
Thio. Just give me some specifics about this one particular item.
05:02
Sorry, Mort. Houses already
05:11
not specifying a user name or password, So we'll just see if this
05:21
all right. It worked, so
05:29
couldn't identify some of the information. But it did come back and tell me my
05:35
So depending on what we find out later, if I can discover some credentials, then I could get some different details from these things. So
05:46
there's a couple different ways to think about how that might pan out
05:53
other types of scanning to think about. We've got,
06:09
There's a strain of scans. My sequel,
06:15
Skins Godfathers, which are interesting thio able to to try to do application. Fantastic.
06:24
There's also skins here for
06:27
other other aspects of windows, like the browser information
06:31
S and B information, as I tried to get,
06:33
um, some specific known vulnerabilities
06:39
related to Windows or some Lennox
06:42
related scans. Not not terminal scanners for Lennox,