All language subtitles for 039 Port scanning using Kali Linux graphical interface-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese Download
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,370 --> 00:00:06,990 Lemon I'll show you another tool if you remember the tools in Cali are listed under the Applications 2 00:00:06,990 --> 00:00:14,730 menu and in applications the tools are grouped by category information gathering vulnerability analysis 3 00:00:14,730 --> 00:00:15,810 and so on. 4 00:00:15,990 --> 00:00:21,080 In the information gathering we've already seen the net discover tool and the map tool. 5 00:00:21,180 --> 00:00:24,010 Now we're going to have a look at these and map tool. 6 00:00:24,450 --> 00:00:31,230 You could either started from the graphical menu or you started from the command line then map as basically 7 00:00:31,260 --> 00:00:35,930 and map sister or brother which is the graphical and map really. 8 00:00:36,240 --> 00:00:41,670 Once you start it all you need to do is type in the IP address and then it automatically populates the 9 00:00:41,670 --> 00:00:43,510 command that is going to run. 10 00:00:43,920 --> 00:00:48,840 And as you can see here this is a very similar command to the one that we ran earlier on the command 11 00:00:48,840 --> 00:00:50,720 interface. 12 00:00:50,730 --> 00:00:55,310 The good thing here though is that from this dropdown menu you can change the options. 13 00:00:55,320 --> 00:01:01,860 So if I choose and then scan all ATC reports notice what happens on the left hand side it automatically 14 00:01:01,860 --> 00:01:07,890 populates the command to scan all ports from 1 to 6 5 5 3 5. 15 00:01:08,110 --> 00:01:13,750 It's still at timing 4 and the minus option that we talked about and the minus v option. 16 00:01:13,760 --> 00:01:15,140 We also talked about. 17 00:01:15,610 --> 00:01:21,890 And as you can see here there are multiple different options that you can pick and choose from. 18 00:01:21,900 --> 00:01:27,030 So I'm going to remove the full port range from here just to keep it quick because we've already seen 19 00:01:27,030 --> 00:01:36,080 the scan output and I'm going to hit scan Now notice the difference because I'm not scanning every single 20 00:01:36,620 --> 00:01:46,920 port and map and this case scans 1000 ports only 1000 points from more than 65000 ports. 21 00:01:47,810 --> 00:01:49,320 So that's a big difference. 22 00:01:49,320 --> 00:01:55,170 However you might not notice a big difference in the results because these are the most common and 1000 23 00:01:55,260 --> 00:01:56,690 Bortz. 24 00:01:56,770 --> 00:02:02,140 So it's very likely that the machine that we're targeting will have the services running on it belonging 25 00:02:02,140 --> 00:02:09,750 to one of these 1000 ports now that the port scan is done again and map is doing the additional scans 26 00:02:10,310 --> 00:02:15,540 the script scanning the Vonda that it is scanning and so on which we talk about in more detail and the 27 00:02:15,540 --> 00:02:18,790 advanced courses and the scan is complete. 28 00:02:19,660 --> 00:02:22,190 You know the see at how much faster the scan was. 29 00:02:23,360 --> 00:02:27,150 Now the nice thing about Zenn map is that visually it's much more comfortable. 30 00:02:27,960 --> 00:02:31,850 You can immediately see here that the ports open are colored in green. 31 00:02:31,860 --> 00:02:38,910 If we had more than hosta scan on the left side we can group the output by the operating system or by 32 00:02:38,910 --> 00:02:44,460 the IP addresses on the right hand side we have multiple tabs that we can go through and that makes 33 00:02:44,460 --> 00:02:51,000 things much easier to look at if we click on the ports that we can see immediately in a very beautiful 34 00:02:51,000 --> 00:02:51,610 summary. 35 00:02:51,780 --> 00:02:57,660 All the ports that are open and this is very important information to us because your job as an ethical 36 00:02:57,660 --> 00:03:03,740 hacker or as a penetration test that your job is to investigate each and every single one of these sports 37 00:03:04,850 --> 00:03:09,620 and the services running behind them to see if there's any vulnerabilities that are existing and then 38 00:03:09,620 --> 00:03:11,860 to try and exploit these vulnerabilities. 39 00:03:12,730 --> 00:03:19,350 So this gives us a very nice summary or sort of a checklist of what boys exist on the target machine. 40 00:03:19,510 --> 00:03:24,550 And as we progress through these videos it's going to be seeing how we work our way through these boards 41 00:03:24,820 --> 00:03:29,130 not all of them obviously because that will be an entire five hour course on its own. 42 00:03:29,320 --> 00:03:33,820 However sequentially I'm going to pick and choose some of these sports and show you how to use them 43 00:03:34,120 --> 00:03:36,490 to break into the target machine. 44 00:03:36,490 --> 00:03:42,040 And this is the tab that shows you the network topology that you're scanning over how the network that 45 00:03:42,040 --> 00:03:44,370 you're scanning is organized or designed. 46 00:03:44,800 --> 00:03:51,250 And because we have one target the network looks fairly simple so this is me the local host and immediately 47 00:03:51,250 --> 00:03:54,540 connected to me is the target machine. 48 00:03:54,610 --> 00:03:58,700 Then you have the host details which is a very high level summary of the host. 49 00:03:58,810 --> 00:04:02,990 So you can see here that the host is up and has 23 open ports. 50 00:04:03,010 --> 00:04:06,940 This is the operating system that got detected and how it got detected. 51 00:04:06,940 --> 00:04:11,140 Again these are things that we talk about in more advanced courses that don't worry too much about that 52 00:04:11,140 --> 00:04:12,140 for now. 53 00:04:12,580 --> 00:04:19,450 And lastly we have the summary of the scan or the command that we did to run the scan. 54 00:04:19,570 --> 00:04:23,950 And by the way if you want you can save the scan of Vesely so you can come back to it later. 55 00:04:23,960 --> 00:04:25,660 Anytime you want. 56 00:04:25,660 --> 00:04:31,120 Now that we have the details scan output we can start to target the services running on the machine 57 00:04:31,470 --> 00:04:37,200 and the next video we're going to be hacking our first service and getting access to our target. 6718

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.