All language subtitles for 018 Scanning a system using NMAP-subtitle-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French Download
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,480 --> 00:00:04,200 The final tool is that they want to point to a section. 2 00:00:04,230 --> 00:00:06,070 It's a very very important tool. 3 00:00:06,090 --> 00:00:08,980 It's called Map and math. 4 00:00:09,060 --> 00:00:16,900 It's one of the best scanning tool in any platform and it's built in. 5 00:00:16,910 --> 00:00:21,700 Inside colonics but you can download the Windows version if you want and map that up. 6 00:00:21,900 --> 00:00:27,700 But I wouldn't recommend that the Linux map. 7 00:00:27,720 --> 00:00:29,200 It's quite effective. 8 00:00:29,400 --> 00:00:36,390 And if you're not very good in memorizing switches minus as minus or minus B you can use a graphical 9 00:00:36,390 --> 00:00:41,770 one so you have to open for using a map for scanning any victim using the command line which you can 10 00:00:41,790 --> 00:00:43,650 start with and then using the 11 00:00:47,980 --> 00:00:49,240 graphical interface. 12 00:00:49,240 --> 00:00:53,300 So let's start by checking and map too. 13 00:00:53,550 --> 00:00:58,050 So I'm going to open a terminal and map the command line first. 14 00:00:58,130 --> 00:01:00,090 It's used. 15 00:01:00,340 --> 00:01:02,110 You can use it by typing and map. 16 00:01:02,230 --> 00:01:07,840 And then if you type minus minus help it will show you all the switches you can use. 17 00:01:07,850 --> 00:01:09,180 And actually it's quite big. 18 00:01:09,220 --> 00:01:15,130 And I'm going to add with the course description I'm gonna add some additional material to explain all 19 00:01:15,130 --> 00:01:24,190 the switches and give you some example but let's take a small demonstration about and map identifying 20 00:01:24,190 --> 00:01:27,970 the victim and let's see how to use it. 21 00:01:27,970 --> 00:01:29,550 So I have here two victims. 22 00:01:29,560 --> 00:01:31,840 Let me check them. 23 00:01:32,080 --> 00:01:34,640 This one is Windows 8. 24 00:01:34,810 --> 00:01:36,790 Check its IP CMG 25 00:01:40,860 --> 00:01:44,270 and type IP config. 26 00:01:46,700 --> 00:01:53,890 And the IP of this machine is 1 4 2 1 3 9 and I have another device another virtual machine. 27 00:01:53,990 --> 00:01:57,180 It's a Windows XP machine. 28 00:01:57,330 --> 00:02:00,730 And let's check 29 00:02:11,140 --> 00:02:18,350 now the first thing we're going to try would be a common line xylem got to choose a graphic and I think 30 00:02:18,350 --> 00:02:26,750 that graphical it's more powerful than a calm and light from my point of view is a common lens is a 31 00:02:27,020 --> 00:02:31,960 powerful one in any tools but graphic it has a lot of feature and you don't need to memorize common 32 00:02:32,000 --> 00:02:38,000 so I'm going to show you first how to scan any system to know the servers operating systems open pool 33 00:02:38,780 --> 00:02:44,490 using ZCom and lines and then how to repeat that using the you of map. 34 00:02:45,110 --> 00:02:47,530 So this is my XP machine. 35 00:02:47,570 --> 00:02:51,050 I just need to get the IP of this machine 36 00:02:54,730 --> 00:03:00,720 which is 1 9 2 and succeed 2 1 3 1. 37 00:03:00,720 --> 00:03:01,940 Excellent. 38 00:03:01,950 --> 00:03:04,840 So getting back to our question in the next. 39 00:03:04,920 --> 00:03:08,580 And let's check both machines using Unmap. 40 00:03:08,640 --> 00:03:17,640 So we're going to type first and map minus small as Zen Captain S which is the port and the service 41 00:03:17,670 --> 00:03:18,720 opening port. 42 00:03:18,720 --> 00:03:27,840 Zen minus capital and then you put the IP of the victims. 43 00:03:27,840 --> 00:03:35,410 Let's try first Windows 8 1 2 1 3 9. 44 00:03:35,490 --> 00:03:36,390 It's quite fun. 45 00:03:36,470 --> 00:03:42,660 As a result of which that you can use you can use a switch that identify or specify a range of board 46 00:03:43,170 --> 00:03:49,010 or the switch to scan a full network or some IP. 47 00:03:49,010 --> 00:03:50,560 I mean that is a lot of switches. 48 00:03:50,760 --> 00:03:57,210 But as I told you instead of memorizing or searching for help I'm going to repeat this step using a 49 00:03:57,390 --> 00:03:59,970 graphical interface and you're going to see the result. 50 00:04:00,090 --> 00:04:06,340 So I'm going to keep this one running and I'm going to put another terminal and scan Zazzle machine. 51 00:04:06,340 --> 00:04:07,820 So to save time. 52 00:04:07,830 --> 00:04:17,390 So here also I'm going to type and map my own as small as captain is minus capital. 53 00:04:17,910 --> 00:04:27,340 And then 1 9 2 1 6 8 1 2 1 3 1. 54 00:04:28,480 --> 00:04:36,430 Okay I think here we have a problem up to. 55 00:04:36,660 --> 00:04:39,140 It was not able to get any single. 56 00:04:39,150 --> 00:04:47,790 I'm not sure if IP is right or not that sleeping on the machine to make sure is that I think 1 9 2 1 57 00:04:47,790 --> 00:04:54,710 6 8 1 2 1 3 9 it's not pinging. 58 00:04:56,820 --> 00:05:01,510 Eyes I'm so sorry these IPs 1 4 2 1 3 9. 59 00:05:01,770 --> 00:05:02,830 My mistake. 60 00:05:06,030 --> 00:05:08,130 Sorry happen sometimes. 61 00:05:08,340 --> 00:05:14,070 So let's clear the screen and comment one more time. 62 00:05:14,100 --> 00:05:22,390 It's 1 4 2 1 4 2 2 3 9 and enter 63 00:05:25,190 --> 00:05:34,140 while here it's not pinging on full is I'm sorry I'm sorry. 64 00:05:34,530 --> 00:05:43,720 And Matt you didn't go one or two and he started in my opinion and need to change that as well because 65 00:05:43,720 --> 00:05:45,340 it was one way for you. 66 00:05:45,610 --> 00:05:51,280 So Also here is one for two. 67 00:05:52,090 --> 00:05:54,780 And you should not take time. 68 00:05:55,240 --> 00:06:03,280 And as you can see for the second machine he give us all the open port to see in the media upload how 69 00:06:03,280 --> 00:06:10,120 to utilize this information to search for vulnerability and what servers are opening those port. 70 00:06:10,150 --> 00:06:12,070 So this one is the Nexus One. 71 00:06:12,160 --> 00:06:19,420 And if use net cut to connect to this port you will know which 10 that exactly is using or which I guess 72 00:06:19,420 --> 00:06:25,450 is using which would be very useful for you in the meta deployed section searching for weaknesses in 73 00:06:25,450 --> 00:06:26,650 those servers. 74 00:06:26,660 --> 00:06:31,620 Also give us the MAC address of this machine. 75 00:06:32,050 --> 00:06:39,730 This is you know useful if you need to do they are to attack like this or capture and he was able to 76 00:06:39,730 --> 00:06:44,920 figure out that this is a virtual machine it's not a physical machine and operating system running on 77 00:06:44,920 --> 00:06:47,700 this machine could be one of those super things. 78 00:06:47,920 --> 00:06:54,780 And here we still have a problem I don't know why most of 1 4 2 1 3 9. 79 00:06:55,090 --> 00:07:01,760 Let's check if we got the right IP here or not. 80 00:07:02,040 --> 00:07:08,640 It's 1 4 2 1 3 9. 81 00:07:09,160 --> 00:07:09,780 OK. 82 00:07:09,940 --> 00:07:16,960 Seems that he was not able to scan Zealander's point one we're going to try to troubleshoot that. 83 00:07:17,320 --> 00:07:26,290 But let's use a graphical way and see if he will be able to scan and get his results from that. 84 00:07:26,560 --> 00:07:32,210 So let's use you for a map which is much more easier and give you much more information. 85 00:07:32,320 --> 00:07:37,370 Open terminal and type Zenn man and man 86 00:07:40,070 --> 00:07:44,780 and opens and map it will opens a graphical interface. 87 00:07:44,780 --> 00:07:55,490 And here you just need two types I.P you could put one computer like this one 9 2 1 6 8 8 1 4 2 8 whatever 88 00:07:55,490 --> 00:08:04,280 IP or you can put that 0 slash 24 which will scan the full letter getting all the computer on the network 89 00:08:04,330 --> 00:08:07,060 and open port and service an operating system. 90 00:08:07,340 --> 00:08:12,840 And the good thing about the maps that is showing you what comment we'll be using and you can say See 91 00:08:13,400 --> 00:08:20,090 if you are aware of and maybe you can change on such switches but I'm going to keep the default and 92 00:08:20,120 --> 00:08:23,690 Weakland going to click on scan. 93 00:08:23,720 --> 00:08:26,270 Now this may take a time because I have like six machine. 94 00:08:26,270 --> 00:08:26,870 So. 95 00:08:26,890 --> 00:08:33,120 But as you can see it's fast but I want to show you what would be the output of his scans full network. 96 00:08:33,170 --> 00:08:41,940 But I'm going to pause for a few seconds until we finish a few minutes because it's going to take time. 97 00:08:42,000 --> 00:08:43,350 So it took a few minutes. 98 00:08:43,410 --> 00:08:47,260 And as you can see and again it will bigger Bickersons that it will take more time. 99 00:08:47,280 --> 00:08:55,110 It was able to discover all PC all the open port services the operating system everything on this machine. 100 00:08:55,530 --> 00:08:59,960 But besides it and even the version of some of those services. 101 00:09:00,390 --> 00:09:07,530 But besides that if you go here to typology he was able to figure out how this network is connected 102 00:09:08,190 --> 00:09:12,130 and which machine it's more vulnerable than other machine. 103 00:09:12,360 --> 00:09:18,420 So if you plan to compromise the network from which one should you start zoning green those are kind 104 00:09:18,420 --> 00:09:20,040 of secure it will take time. 105 00:09:20,220 --> 00:09:25,800 Well one is that this is very easy to compromise and usually is ruling the network that if you compromise 106 00:09:25,890 --> 00:09:29,290 any computer inside the network it's quite easy to compromise that amount. 107 00:09:29,580 --> 00:09:37,530 So if I can get access to this machine then there is some technique that can be used to compromise secure 108 00:09:37,530 --> 00:09:38,280 one. 109 00:09:38,280 --> 00:09:43,340 And one of the major one of those attack is call Pozza hash. 10536

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.