Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,280 --> 00:00:05,240
Service and version detection and map as V.
2
00:00:05,250 --> 00:00:08,450
Target 1 scanning within map.
3
00:00:08,450 --> 00:00:16,370
It's not enough to obtain just the open port information with his information.
4
00:00:16,470 --> 00:00:20,760
It's pretty necessary to know the name and the version of the service running on the open port.
5
00:00:20,780 --> 00:00:21,000
Yeah.
6
00:00:22,410 --> 00:00:28,500
So the version information will give us more insight into what are the possible attacks that we could
7
00:00:28,500 --> 00:00:38,710
actually launch so there's a database of more than 20 200 services and in map whereas any database it's
8
00:00:38,710 --> 00:00:42,370
in the user share and map and map services.
9
00:00:44,440 --> 00:00:51,100
So the database contains the names of the services that can operate according to the port information.
10
00:00:51,230 --> 00:01:02,370
For example port 80 course is mostly used by HDD P service Ward 53 is usually used by the DNS servers.
11
00:01:02,370 --> 00:01:09,540
The point here is that the port numbers do not always belong to the server mentioned that earlier but
12
00:01:09,540 --> 00:01:11,650
I want to make this clear.
13
00:01:11,730 --> 00:01:18,300
So it means that the system administrator can change the HDD Peace Service 80 to Twelve eighty from
14
00:01:18,300 --> 00:01:19,980
within the program.
15
00:01:20,010 --> 00:01:26,280
So in this case the port number and the service running on that board must be detected and verified
16
00:01:27,470 --> 00:01:37,420
over this purpose and map uses the end map service probes database so this database is located in user
17
00:01:37,570 --> 00:01:47,520
share and map and map service probes and this database will contain different query statements for each
18
00:01:47,640 --> 00:01:55,330
service so it will try to detect this service and the version running on the end map work by running
19
00:01:55,330 --> 00:02:05,000
these weary statements so and map is very successful with this and then when you're armed with this
20
00:02:05,000 --> 00:02:11,400
information you may discover there may be different vulnerabilities depending on the version of each
21
00:02:11,490 --> 00:02:17,290
service of course specific vulnerabilities can be attacked.
22
00:02:18,590 --> 00:02:27,760
It is therefore necessary to use the S V parameter when scanning within map so I'll show you an example
23
00:02:29,380 --> 00:02:30,750
open virtual box.
24
00:02:30,760 --> 00:02:39,620
When Kelly Linux tender 0 that that 1 5 open meadows Floyd will end at zero to do that for log into
25
00:02:39,720 --> 00:02:50,120
Kelly Linux VM Ms user name root password to her and open terminal so right this command and map 10
26
00:02:50,120 --> 00:03:00,770
dot 0 0 dot to dot for top ports 10 press enter and the scan results her year as you can see it only
27
00:03:00,770 --> 00:03:08,840
lists the port names numbers word state whether they're open or closed as well as the service names.
28
00:03:08,900 --> 00:03:17,650
So now do the same operation with the S V parameter and map 10 that zero dot do dot for top ports 10
29
00:03:17,800 --> 00:03:27,850
S V and press enter the scan results are here now of course scanning with the V parameter will take
30
00:03:27,850 --> 00:03:28,890
a little bit longer.
31
00:03:30,120 --> 00:03:37,850
But as you can see here the version information of the open ports has been added to the list so that
32
00:03:37,850 --> 00:03:43,730
means that according to the version information that we gather here we can develop attacks specific
33
00:03:44,180 --> 00:03:45,920
to our target system.
3972
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.