Time
9 hours 54 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
everyone welcome back to the course. So in the last video we started our lab. We went ahead and ran a scan in and map or Zen map, which is what the gooey version of its called We then went in and terminated our service on our limits machine. And then we've come back, run another skin on the same
00:17
range of I P addresses. And now what we're going to do is you save this scan, others completed,
00:22
and we're gonna take a look at the results of both scans and do a comparison.
00:26
So once your skin has completed, just go ahead and we're gonna go back to the scan option here and save our skin. And again, we're going to say this one to the desktop, and this time we're just going to be calling it
00:37
second scan
00:39
dot xml
00:44
alright, and just say that there
00:47
so now where we're going to do is we're gonna use the compare option here, so we're gonna go to tools and then compare results,
00:56
and we're just gonna select our first scan here for the A and then R B scan will be the second scan.
01:03
So just go ahead and select that there.
01:07
All right, so the only question they have now is do you notice any difference between the files?
01:12
So as you scrolled on and you look at various services that is found,
01:17
do you notice any major differences
01:19
and just a hint for you? And so once you've identified that, just type those on your document there. But as you look at this, a hint for you as changes will be highlighted, so we'll leave it at that.
01:33
So in this lab, all we did is we went ahead and ran a couple of scans using Zen map.
01:38
Teoh both run a scan initially on on the network. And then we also went ahead and terminated our SS eight services.
01:46
And then we went ahead and run another scan to see the differences. So we should see, is that several machines are now down after we stopped the services on them.
01:55
So in the next video, we're gonna go ahead and take a look at control number two

Up Next

CIS Top 20 Critical Security Controls

This course will provide students with an overview of the CIS Top 20 Critical Security Controls v7.1. Students in this course will learn each CIS control and why it is important to an organization.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor