3.20 Scanning Techniques Lab Part 11 EH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 47 minutes
Video Transcription
Hi. Welcome back to the course. And the last video. We went ahead and ran an acknowledgment scan after we turned on Windows firewall.
In this video, we're gonna talk about using H paying three. We're gonna run a Christmas scan,
so let's go ahead and get started. So you should already have the Cali terminal window open. If you don't go ahead and launch it, and then we're gonna type in and step number two here, Run a type in this command here.
So the dash lower Casey is we seem to four is specifying the PAC account dash capital V mix of verbose dash P. Lower case P allows us to specify the port number.
The dash rumor case s allows us to specify the base port. So which which port is sending the packet?
The dash capital M sets a TCP sequence number and then finally the dash capital U p f sets the urgent push in the Finnish flag's. So let's go ahead and type that command in there.
So we're gonna type in age ping three all over. Case space, dash capital, C space the number one
space dash capital V
space dash, Lower case p
Space 80
Space dash lower case s space 55552 Again for that sending port
space dash capital M space the number zero
space dash U P F all capital. And then finally, our I p address over Target Machine's the 1 92.168 dot zero doubt one and they just hit the enter key there.
All right, so we're gonna give that a second to run there.
So what we're going to see here is that it shows us one package transmitted and zero packets received. So
question number one. How many Pakistan's the show were sent successfully, So one packet transmitted. So that's the number one there.
Question number two. How many Pakistan's A show were received successfully, so zero packets recedes in 100% packet loss were to say, zero there.
Now, one thing to keep in mind here is that even though it's basically showing us that hey, port eighties closed,
it's actually open because windows machines. If you remember Windows machines don't follow RFC 793 So the way they do t c p i p so basically right Windows machine is not going to respond from Port 80 even though port eighties actually open on this particular server.
So let's move on to step number three here. We're gonna type of sin flag scan. So we're gonna do a TSH ping thrilling
a space,
and then we're gonna spend do Dash eight, and then we're gonna specify airport. So h paying three
space, Dash eight, space 80 and then a space And where to do capital. As for our sins can a space. And then finally, our target i p address. So let's go and run that. Want to see what kind of results we get back.
All right, so you see that it's starting to kick back some results there, and we're gonna give it a second or so they're so we want to see is Port 80 showing open when we run this since can
So let's see here, Port 80 and we're not really seeing a reply there, So it's yet shown us that it's not responding at all, even though we know, actually, that poor teddy is open on this particular device.
So why do you think that is? Well, because we're pinging. Ah, Windows machine. Basically, we're doing a scan on a Windows machine and that doesn't recognize the Christmas scans at all.
So in this video, we talked about HP thrilling and using Christmas scans and the next lab We're gonna go over operating system fingerprinting.
Up Next
Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By