3.12 Scanning Techniques Lab Part 3 EH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 47 minutes
Video Transcription
I welcome back to the course. And the last video we went over 1/2 connect scan within map
in this video, we're gonna go ahead and run a full connect scan to see what our results look like.
So we've already got our terminal window open here. We're just gonna either
you can either type clear to clear up some of the stuff here, which I'm gonna do, or you can just go ahead and start with Step one and weaken type away here. So Step one. And our only step of this lab is stopping in this command here. So this lure case s t is gonna be the TCP connect pork skin.
So we're gonna type that in. And then, of course, our i p address of our target machine.
So let's go ahead and get started with this type in end, Matt, All over case
we're gonna put our space and then our dash, a lower case s and a capital T,
and then we'll put the I p address of our target machines that 1 92.168 dot 0.1
and then just press enter to let that run
it might take a moment soda run. But we want to see what our results were gonna be with that.
So a similar thing here is the previous scan is gonna scan. When we don't specify a port number or an amount of port to the report range, it's going to skin a default set of 1000 different ports.
All right, so you see, we are scanning our device, and these are the only open ports
on that machine.
So we see that these ports are open and so somewhat similar to what we had seen before. That we're seeing the scans are open. It's also showing us that 986 ports are closed.
So our question number one, what were the results? While we see that several ports are open and we could go ahead and less support numbers on a document if we want to. So we could say that Hey, port 80 is open
and, you know, port 1 35 is open and et cetera, et cetera.
All right, so in this lab, we just went over a brief introduction to the TCP full connects cannon and map.
So when in the next video where to? Go ahead and talk about the Xmas scan or the Christmas scan, and we'll go ahead and run one of those and you'll see the difference between running that on against a Windows machine or Lennox machine.
Up Next
Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By