Time
9 hours 47 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:02
Hi. Welcome back to the course and the last video. We ran our first acknowledgment scan to see if a port 80 was filtered or unfiltered onto the target machine.
00:11
In this video, we're gonna go ahead and turn on Windows firewall on her server on our target machine, and then we're gonna come back, and we're gonna run an acknowledgment skin again to see what kind of results we get.
00:22
So let's go ahead and get started. So are step one. We want to connect to PL A B s, A 01 which is actually our server machines were gonna click on that up here.
00:31
Might take a moment or so to get it launched. Here. You'll see we have the command line probably still showing that a command prompt. So just go ahead and close out of that.
00:39
So next we want to right click on the start menu and select Run.
00:43
So a couple ways, you can get to where we're eventually going, which is the Wonder Firewall settings. You can either type this firewall command or you can also just go to the control panel, do it there. So for this particular lab, we're gonna do it this way so you can get that experience. And then in the next lab
00:57
excuse me. A couple laughs when we do h paying three and turn on Windows firewall. Then we're gonna go through a different process to do it from control panel.
01:04
Just you can see the different ways we can get there,
01:07
So let's go ahead and get started. So we right click on the start menu and select Run. So let's go ahead and scroll down to the start menu.
01:14
Right? Click and select Run.
01:18
And this little box here, we're gonna run firewall dot CPL. So it's going Type that in there. We're gonna type
01:26
firewall dot CPL and then just hit the enter key.
01:32
You'll see it pulls up the windows firewall for us right here
01:36
our next. Up here,
01:38
we're gonna click on Windows Firewall. So you see, we're nose fire while opens. We're actually gonna click to turn Windows firewall on her off on the left side here.
01:47
All right, so now that takes us to the customized settings page. So that's what we see here in step seven.
01:53
So then, under the private network settings, what we want to do here. So under this top section here,
02:00
we actually wanna go ahead and check the boxes. Says, block all incoming connections, including those in the list of allowed app. So this top check box right here, go ahead and click on that and selected.
02:12
All right, so let's move on to our next step. So step number nine. So under the public network said setting section. So this bottom section here,
02:22
we want to check the box. We want to turn on Windows firewall and then check the boxes, his block, all incoming connections, including those in the list of allowed apse. So we're gonna turn on Windows firewall on, then choose the vory top check box there.
02:36
All right, So move under our next steps, we're just gonna click okay to save our changes in step 10.
02:42
All right, so my take a second or so, but we save your changes.
02:46
Okay? So now we're gonna go back to our Windows 10 machine so we can just go ahead and accept this window's firewall. We don't need that right now,
02:55
and we're gonna go back for Windows 10 machine
03:00
and back to our terminal window here.
03:02
So now we're gonna type this command here when I type basically the same command there to run our acknowledgment skin. We just want to see what kind of results we get back. So
03:12
we can either just click the up barrow there till we get to the command. We just ran
03:16
or you get is typing. And if you want to, But I choose to just use upper back to the command words end map, space dash lower case s capital, a
03:27
space dash more case P d Define our port number, put a space and then 80 for report space. And so if you just used up arrow again, that will take you back
03:37
to the command that you're looking for.
03:39
And I had typed clear, which is why I'm getting that is my first command there. If you didn't talk clear to clear out in previous lecture, then you're good to go. You don't have to worry about that.
03:49
You just press the upper road. It'll bring back this command for you. What you bring back there's just click Enter horse again.
03:57
Reduction in our command here. So now we want to see
04:00
and question number one. Here is port 80 is a shoo in as filtered or unfiltered. So we're gonna give it a second to run here,
04:06
so, huh? Look at that.
04:09
It's showing us that Port 80 now shows us filtered. All right, so we're gonna go ahead and just mark that down in our lab here. So now it's filtered. So again we turn on Windows firewall to basically blocked all those incoming connections. So that's why even though it's in on what we're seeing that
04:27
in this video, we turn on Windows Firewall. And then we ran another acknowledgment scan to see that poor lady was filtered or unfiltered. And this case, we noticed that. What? Next video? We're gonna go ahead and start our H Ping three lab, so we're gonna run a sin scan initially, and then we'll move into some acknowledgement scans in a couple later videos

Up Next

Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor