9 hours 47 minutes

Video Transcription

I welcome back to the course and the last video we used H. Ping three an end map to perform a check for live systems.
In this video, we're gonna use the same tools, but we're gonna perform a check for open ports
and this initial video, we're gonna go ahead and get our environment set up.
So I do wanna again state that this lab is gonna be done in the cyber, a lab environment so you can still use these commands on your local machine there. You're a few half of Cali machine set up. However, we're not gonna cover of that particular type of setup in this lab.
So let's move on to our lab.
Step number one. We're gonna log into the labs, which already done here, and they were to select the ethical hacker practice labs.
Step number three. We want to click on the largest, is performing a check for open ports,
and they were to select the start button.
So I'm gonna go ahead and back up to that initial page there.
So step number three
before me a check for open ports. We go ahead and click on that, and then you'll see a star bright in here. Just click on that. That's gonna launch the lab.
There you go.
All right. Step number five. Turn on all the virtual machines if they're not already on.
And all you have to do is have your mouse over top and there will be a turn on button here if it's turned off.
If you run into any any issues where you do that and it's not pulling up, just click on that refresh button at the bottom of each one, which everyone's having the problem, and that should clear it up for you.
Our next step here is we want to connect through the V NC viewer to the Cali machine. So we want to make sure we click on this Win 10
option here,
which I've already clicked on. And then we see the DNC viewer icon there.
So we're just gonna double click on that V NC viewer icon.
Well, that's gonna open it up for us.
You're gonna see it puts it I p address there.
So we see that it launches and step seven. Step number eight. We want to type the address of the Cali machine. So by default and generally will populate it there for us. And we see that that is what we're looking for. We see 1 98 16803
Colon one.
So next we're gonna go to step number nine, and that's where we click to connect Button. So let's click over here was going to say, connect that bottom right button.
It's gonna ask us for a password.
So the password here is gonna be password, but this is gonna be a zero. So the number zero and not a capital O.
So let's go ahead and type that in and step number 10. So capital P all over, Case A S S W and then remember it. Zero and then a lower case R in a lower case D
that either hit, enter on your keyboard or just click the okay button.
It might take a moment or so, but then it's gonna launch the Kelly desktop for us.
All right, so we see that the Cali desktop is open for us.
So step number 11 is just double clicking on that route terminal icon there to actually launch a terminal window for us.
So let's go ahead and do that now
writes me. Double click always opened about for us.
All right, so in this video, we just talked about getting are set up for the rest of the lad that we're gonna do. And the next video, we're gonna go ahead and enter an end, Matt command and see if we could find any open ports. It'll

Up Next

Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor