3.15 Scanning Techniques Lab Part 6 EH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 47 minutes
Video Transcription
Hi. Welcome back to the course. In the last video, we talked about running the end map, the Christmas cannon en masse.
So what that allowed us to do is see some different ports that are open. And also, we were able to use the reason switch to see what the reason was. Now, if you remember, we were running a Christmas scan in and map, it's gonna show us Any port that doesn't give a response is going to classify that as open
in this lab. We're gonna actually run an acknowledgment scan or a C K scan. We're gonna see basically, if a port is filtered or not.
So let's go ahead and get started.
So I'm gonna go ahead and close the Zen map from the previous lab,
and he's going to say we have some unsafe changes. We'll just say close anyway, because we don't care about this.
And now we're gonna move on to step one of this lab. So step one here. We've already opened up or when 10 machine. That's where we are here. And then we're gonna maximize that DNC viewers so we can check out our Callie machine. So just scroll to the bottom of the page and click of a little orange icon. They're going to take a moment or so to pull it up here. But now we see that R. Kelly terminal window is available for us.
So if it's if it's not open, if it closed, for some reason, just double click on the Cali route terminal here and hoping the command prompt.
So we're gonna move on to step number four. We're gonna actually type in this command here,
so we're basically setting the acknowledgment switch. That's this dash Lower case s Capitol eight and then we're going to specify the port number with this lower case P
and then, of course, support 80. And then we're gonna run the I P. Address.
So I'm gonna go ahead, type clear just to clear out this previous commands to make a look a little better. But you can just go ahead and type it if you want to.
So again and map space dash lower Case s capital, a
space dash. More case
P space 80 for report number and then space, and then our I p address. So let's go ahead and type that in here
so N map
space dash lower case s Capitol A space dash. Lower case p Another space. Our port number, which is 80 Another face and that our i p address, which is 1 92 down 168.0 dot one.
Well, then just press enter to go ahead and run that command.
She's gonna take a moment of soda, run here.
Now, again, I wanna stress that the axe scan is used to help determine the rules of a filter. So we can see is a filtering What's it filtering that sort of stuff.
So we see here that we only have one response here, so we see a port 80 now shown us that it's unfiltered here.
So let's take a look at our question. Number one is Port Eddie filter unfiltered.
So we see that it's unfiltered here, so we would just go ahead and type that in our question. Here.
There we go.
So in this lab, we just went over. Ah, quick acknowledgement scan to see if the port is filtered unfiltered,
and the next video we're gonna go ahead and turn on Windows firewall and then we'll run an acknowledgment skin again to see what kind of results we get.
Up Next
Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By