Time
23 hours 21 minutes
Difficulty
Intermediate
CEU/CPE
14

Video Transcription

00:02
Hi. Welcome back to the course. In the last video we talked about using HP in three, we ran a simple acknowledgement scan. We also noticed that there was 100% pack of loss in the scan
00:12
and this video. We're gonna go ahead and turn on Windows firewall, and then we're gonna see what the scan shows us this time around. So let's go ahead and get started. So we want to connect to our server machine. So the P l A. B s a a one.
00:25
So I already connected there
00:28
our next step here because we want to right click on the start menu and then select control panel. So let's go ahead and do that. So we're gonna scroll down. We're gonna right click on our start menu and select control Panel.
00:39
I was gonna open this window for us here, So let's look at our next step.
00:43
Next Step three, we want to click on System and Security and then stepped forward and click on Windows Firewall. So we're gonna click on Systems and Security
00:52
and then Windows firewall right here.
00:55
Okay.
00:56
All right. So let's go back to our document and take a look. So now we're at step five. We're gonna click to turn Windows firewall honor off. So on the left side here, you see turned Windows firewall on her off. So go ahead and click on that.
01:08
But now we see some settings that we can change here, so let's see which ones we need to do.
01:14
So step number seven under this top section under the private network Settings area.
01:19
We want to check the box that says black all incoming connections, including those in the list of allowed apse. So this very top check boxes go ahead and click in there
01:27
all rights, and I'll move on to our next step. So step number eight under the public network settings. So this bottom section here,
01:36
we want to turn on Windows firewall and then check the boxes says, block all incoming connections, including those in the list of approved Excuse me, a list of allowed APS,
01:46
so turn on Windows Firewall. Go and click that and then we'll choose that top box again.
01:52
All right, so our next step here is just clicking okay to save those changes. So let's go ahead and do that. We're gonna click Okay there.
02:00
All right, So now we're gonna change back to our Windows 10 machines. We could just go ahead
02:05
and swap back to our Windows 10 machine. So this one right here might take a second soda, Pola. And then we already have our Callie desktop launched there.
02:15
So Step number 11. Open the Cali terminal window again. Only if you didn't have an open already.
02:20
And then we're gonna take this command right here. So if you remember the dash lower case seem was for a PAC account Dash Capital V was to make it for more verbose and give us more information.
02:30
The dash lower case P was to help us specify the port number in this case, we're running it against Port 80
02:36
dash lower Case s is the baseboard base port. Excuse me. It allows us to specify the base port that we're sending the packets from now. Then the dash Capital A is the acknowledgment flag. So let's go and type that commanding again. So we can either type it in
02:51
or you could just hit Thea payroll. I'm gonna go ahead type of answering. It's in practice here, So H ping three. Oliver case a space dash. Lower case C
03:00
Face the number one
03:02
space dash capital V space dash lowercase P
03:08
space the number 80
03:10
space gash Lower case s
03:15
space. The number 5555
03:19
space dash capital A
03:22
space. And then finally, our I p address our target I p address.
03:27
So again,
03:28
h Ping three ng h ping three Dash C one dash capital V dash lowercase P 80 dash s five five five five dash A
03:39
and then our target I p address. So once you've taught that in there, just go ahead and hit. Enter and it's gonna run the scan for us.
03:46
So then we have a couple of,
03:47
uh, questions here.
03:51
So do we have any packet loss? It also Yes. We do see that there's 100% packet loss here.
03:57
And is this any difference from the first scan? So, actually, no, it's not. It's not any different from the first scandal. We see we still have 100% packet loss here.
04:06
All right, so we just jot that down as well.
04:14
All right, then we do not see any differences.
04:16
So in this lab we talked about, we turned on Windows firewall. And then we ran another acknowledgment skin against it to see what we're looking at.
04:25
In the next video, we're gonna talk about
04:28
using the Christmas can in H paying three.

Up Next

Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor