Time
23 hours 21 minutes
Difficulty
Intermediate
CEU/CPE
14

Video Transcription

00:02
Hi. Welcome back to the course. In the last video, we ran a simple and Matt Command to check for open ports on her target system.
00:09
In this video, we'll use H. Ping three to do a similar thing.
00:13
So we only have one step in this particular video, and it's just typing this command here,
00:18
so we're gonna type all over case H. Ping three
00:21
a space dash eight. And so the dash eight enable scan mode.
00:26
We're gonna put another space, and we're gonna put a range 0 to 5000 0-5000. That's just gonna be our range of ports to scan.
00:34
And then we're gonna put us another space, a dashing a capital s that's gonna allow us to set the sin flag.
00:40
And then, of course, another space in our actual I p address that we're targeting.
00:44
So let's go ahead and do that. Now
00:47
we're in a type h ping three all over. Case
00:53
next, we're gonna type that dash eight.
00:57
Okay,
00:59
put another reports to scan
01:00
so 0 to 5000
01:03
put another space, and then we want to again to that dash capital s what you're gonna allow us to set our sin flag,
01:11
and then we're gonna finish off with typing in our I p address here.
01:17
So are 19 to put a space in the 192.168 dot 0.1
01:23
and then just press enter under keyboard. Now, it might take a moment or so for this to run, so we're gonna give it a second here. What you're gonna notice is that it is showing us different responses is getting
01:34
from the different ports. Uh, the other thing I want to point out while it's running here
01:38
is we also get some kind of response here. So let's go back to our lab document
01:44
the question number two. Did we notice any acknowledgment? Responses? So if you remember our TCP three way handshake,
01:51
I send a sin packet to you. You send me an acknowledgment of sin packet back, I send you an acknowledgment. So did we get any type of acknowledgement responses at all? So we're just gonna come up a little bit here
02:01
in R Kelly,
02:04
command line here,
02:06
bear with me second terminal window.
02:07
So what we're looking for here is to see if we got any Acknowledgment packet, It'll so were to come back up
02:13
to ride in here.
02:15
So what we see here is that
02:16
here's our sin flag and then we do have acknowledgment. So we see on all these ports,
02:23
we do have an acknowledgment flight coming back at us.
02:25
So back on our lab document here, we would say yes to this question. Here we are getting acknowledgement responses,
02:32
and then this, also similar to the end map will show us
02:37
what's running on that particular port if it's named,
02:40
and some of them may not be named as you see these couple of one's here.
02:46
So in this video, we just went over using end map and H paying three in this entire section to check for open ports
02:55
in the next lab were to go over some different scanning techniques.

Up Next

Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor