Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,810 --> 00:00:04,920
Another user for netcat it's to grab Zyban.
2
00:00:05,430 --> 00:00:11,670
And what I mean by grabbing Ziman banner whenever we try to connect to an open port on another machine
3
00:00:12,270 --> 00:00:19,050
that has a service it will display some information about the service and this can be very helpful for
4
00:00:19,050 --> 00:00:25,170
any hacker to identify as a product or the software that is running on this machine and try to find
5
00:00:25,170 --> 00:00:26,350
a vulnerability.
6
00:00:26,610 --> 00:00:33,030
Let me give you a small example assumes that I scanned the Windows machine from my colonics machine
7
00:00:33,540 --> 00:00:40,640
and I notice that they have put into an open will talk about scanning later on.
8
00:00:40,680 --> 00:00:47,660
But the point is that they have this piece of information and I know that 4:21 usually is used for FTB
9
00:00:47,670 --> 00:00:54,270
so I need to know what product that or what service or software they are using.
10
00:00:54,270 --> 00:01:03,270
So I can start searching for any weakness or vulnerability so I can typeset and see netcat and then
11
00:01:03,810 --> 00:01:11,680
the windows IP which is one that was 0 9 and then support 29 21.
12
00:01:11,730 --> 00:01:20,130
So I'm asking him to connect to this specific computer's report into and that I know that it's open
13
00:01:21,090 --> 00:01:26,580
and 1c I don't have I don't need to have a username and password because what happened is whenever I
14
00:01:26,580 --> 00:01:33,870
try to connect to the port a banner will be showing it's sending you welcome to ability server two point
15
00:01:34,480 --> 00:01:35,830
three two point two.
16
00:01:36,060 --> 00:01:42,450
So just by doing that I know knows that the Windows machine has this server with this version so I can
17
00:01:42,450 --> 00:01:48,300
start search for any vulnerability related to such service.
18
00:01:48,360 --> 00:01:58,080
Well if I didn't do it I know that he got FTB server running except I don't know what product he's using
19
00:01:58,440 --> 00:02:00,180
or which version he's using.
20
00:02:00,180 --> 00:02:04,700
So this is called a banner grabbing.
21
00:02:05,490 --> 00:02:09,490
It's not requesting or it doesn't need any username and password.
22
00:02:09,480 --> 00:02:15,100
You just try to connect using netcat and from the burner you can get some useful information as you
23
00:02:15,280 --> 00:02:15,630
so.
2589
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.