Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,240 --> 00:00:03,440
OK so now let's cover network commands.
2
00:00:03,600 --> 00:00:10,080
So the first command I want to cover is i f config so you may be familiar with the Windows version of
3
00:00:10,080 --> 00:00:14,770
this which is IP config and they pretty much do the same thing.
4
00:00:14,850 --> 00:00:21,900
So it shows you hear your different interface types and the IP address associated with them.
5
00:00:21,960 --> 00:00:31,770
So each zero here either net zero has an IP address of 1 9 2 1 6 8 1 3 2 1 6 4.
6
00:00:31,770 --> 00:00:37,390
You can see the net mask the broadcast address and you can see the MAC address as well.
7
00:00:38,070 --> 00:00:41,790
And we also have a loop back address here.
8
00:00:41,800 --> 00:00:48,250
Now if your machine has a wireless adapter or at some point you want to do wireless penetration testing
9
00:00:48,400 --> 00:00:55,450
you're going to need a W config and you should not expect to see anything on this at the moment unless
10
00:00:55,450 --> 00:01:00,910
you're using a laptop then you actually might see a configuration down here for it if you would see
11
00:01:00,910 --> 00:01:02,520
something underwriter you can flag.
12
00:01:02,530 --> 00:01:08,080
You would see like a W lan one w land zero something along those lines.
13
00:01:08,110 --> 00:01:08,430
OK.
14
00:01:08,440 --> 00:01:14,980
And another common command that we're gonna see is gonna be the ping command so we can just type in
15
00:01:14,980 --> 00:01:19,180
ping and the address that we're trying to talk to.
16
00:01:19,180 --> 00:01:28,460
So for example I'm going to try to paying my home router and I get talking back.
17
00:01:28,620 --> 00:01:34,590
So if I tried to ping something that wasn't in my network like a 16 down one you're going to see the
18
00:01:34,590 --> 00:01:36,660
results change.
19
00:01:36,660 --> 00:01:43,310
So with ping here ping is going to be endless until we hit something like control C to stop it.
20
00:01:43,360 --> 00:01:49,750
It'll ping forever so I'm going to control C again and kind of show you the difference.
21
00:01:50,520 --> 00:01:56,810
So you see that we attempted to ping here and we got replies We got information back.
22
00:01:56,820 --> 00:01:58,130
Well that's good.
23
00:01:58,180 --> 00:02:01,040
That means we're talking to the other machine and says Hey are you there.
24
00:02:01,040 --> 00:02:06,510
It says Yeah I'm there and we try to ping this machine here but this machine's not talking back.
25
00:02:06,510 --> 00:02:12,430
It could mean that the machine is on the network or that the machine is just blocking ICMP traffic.
26
00:02:12,510 --> 00:02:15,460
Icmp is a another word for ping.
27
00:02:15,540 --> 00:02:17,560
So moving on to the next command.
28
00:02:17,940 --> 00:02:24,750
I want to show you ARP so the best way I like to type in is ARP with a switch of a
29
00:02:27,640 --> 00:02:35,590
and ARP is just going to show you mac addresses that it talks to and the IP address.
30
00:02:35,740 --> 00:02:40,690
Actually I said that backwards is going to show you the IP address it talks to and the MAC address associated
31
00:02:40,690 --> 00:02:41,960
with it.
32
00:02:41,980 --> 00:02:51,820
So if an IP address reaches out say 1 9 2 1 6 8 15 that one talked out to this machine it's going to
33
00:02:51,820 --> 00:02:53,500
say OK hey Who are you.
34
00:02:53,490 --> 00:02:57,130
It's to get a broadcast message out and say who has this IP address.
35
00:02:57,310 --> 00:03:00,300
And then the IP address will respond and says Hey I do.
36
00:03:00,310 --> 00:03:02,170
And this is my mac address.
37
00:03:02,170 --> 00:03:10,260
So ARP is just a way of associating IP addresses with mac addresses and once you know that you can also
38
00:03:10,260 --> 00:03:11,840
look at net stack.
39
00:03:12,120 --> 00:03:20,340
So net stat dash AML is another one of my favorite commands and this shows you just the active connections
40
00:03:20,340 --> 00:03:22,140
that are running on your machine.
41
00:03:22,200 --> 00:03:23,490
So if you scroll way up
42
00:03:27,450 --> 00:03:35,730
and you can just kind of see what's open and what's talking here where this really comes in handy on
43
00:03:35,730 --> 00:03:41,520
a penetration test is to see if a machine is talking to somebody else.
44
00:03:41,520 --> 00:03:42,930
Same thing with AAP.
45
00:03:42,960 --> 00:03:46,010
You want to know what that machine is associated with.
46
00:03:46,170 --> 00:03:49,710
And is it talking to something on a port.
47
00:03:49,740 --> 00:03:53,580
So this is more just internal right now but it's still good to know.
48
00:03:53,610 --> 00:03:59,850
So for example if I were to open up a Firefox page and connect out to the internet then I went and I
49
00:03:59,910 --> 00:04:05,330
did a net debt again I would see information about that port being open and.
50
00:04:06,070 --> 00:04:07,800
And that I am going out with it.
51
00:04:08,340 --> 00:04:12,340
So just kind of keep that in mind.
52
00:04:12,380 --> 00:04:16,470
These are not commands that you really need to know in depth right now.
53
00:04:16,580 --> 00:04:20,880
Networking does come into play when you are doing penetration testing.
54
00:04:21,000 --> 00:04:23,650
But we're going to cover these commands time and time and again.
55
00:04:23,660 --> 00:04:31,940
I just wanted to give you a very brief introduction to them OK in the last command that I have for you
56
00:04:31,940 --> 00:04:34,100
today is rude.
57
00:04:34,170 --> 00:04:39,660
So if you type in a route that's going to print your routing table in the routing table is important
58
00:04:39,690 --> 00:04:45,630
because it tells you where your traffic exits essentially.
59
00:04:45,630 --> 00:04:52,140
So for this VM my traffic is exiting on 1 9 2 1 6 8 1 3 4 0.
60
00:04:53,520 --> 00:04:59,730
So any traffic goes out of this 0 0 0 0 gateway in this range right.
61
00:05:00,450 --> 00:05:07,830
So when it goes out this gateway it's doing not so network address translation and it's running off
62
00:05:07,830 --> 00:05:08,490
my computer.
63
00:05:08,490 --> 00:05:14,730
So the best examples aren't here but it's important to know route as well because there could be a machine
64
00:05:14,730 --> 00:05:21,240
that you're attacking that has multiple rounds so you might see a 134 and a thirty five because it has
65
00:05:21,240 --> 00:05:25,320
a dual home Nick the meaning it has to nicks inside of it.
66
00:05:25,320 --> 00:05:29,390
So it's actually talking to a completely different network that you didn't know existed.
67
00:05:29,460 --> 00:05:34,680
So you might have been attacking one network and the one thirty four range and then one thirty five
68
00:05:34,680 --> 00:05:37,080
just out there and this computer can talk to both.
69
00:05:37,080 --> 00:05:39,870
And until that point you had no idea.
70
00:05:39,870 --> 00:05:44,690
And that's the idea of called pivoting when you switch a network from one to the other.
71
00:05:44,720 --> 00:05:46,160
But you're using a machine.
72
00:05:46,380 --> 00:05:51,570
So that's it for this lesson and the next lesson we're going to talk about viewing creating and editing
73
00:05:51,570 --> 00:05:52,020
files.
7628
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.