1 00:00:00,280 --> 00:00:05,650 And Lou everybody when it comes to my advanced ethical hacking networking penetration testing goes 2 00:00:18,090 --> 00:00:22,780 in this video we are going to talk about the security of the network. 3 00:00:22,830 --> 00:00:34,590 So I'm to be more precise the security of the D H C.P. distribution IP addresses because sometimes let's 4 00:00:34,590 --> 00:00:36,840 say that we have this network. 5 00:00:36,930 --> 00:00:42,030 So we are he as the administrator or by configuring or a welder. 6 00:00:42,040 --> 00:00:48,990 And and this is the server which provide the IP address for any kind of devices. 7 00:00:48,990 --> 00:00:59,370 So let's say that an attacker wants to join the network to intercept the net worth to intercept the 8 00:00:59,370 --> 00:01:07,260 network with his own server so that all devices get an IP address from his server so that he can get 9 00:01:07,260 --> 00:01:10,680 control of all of our network. 10 00:01:10,680 --> 00:01:13,310 So what he can do he can just try. 11 00:01:13,400 --> 00:01:14,210 Okay let's see. 12 00:01:14,260 --> 00:01:15,910 OK let's first. 13 00:01:15,960 --> 00:01:25,790 So this project is something new so that we don't indeed save us well uh Dong 14 00:01:28,960 --> 00:01:35,710 new attack over let's all get right. 15 00:01:35,720 --> 00:01:37,820 So let's say the attacker says to himself. 16 00:01:37,930 --> 00:01:38,530 Okay. 17 00:01:38,600 --> 00:01:46,140 So he gets away so that he can join all he can connect to network. 18 00:01:46,200 --> 00:01:49,290 So he brings his server right here. 19 00:01:49,290 --> 00:01:54,120 So it's it's it's trying to find the server okay. 20 00:01:54,140 --> 00:02:01,010 So he wins the server right here and then equal next to a welder. 21 00:02:01,020 --> 00:02:07,890 So if see unit clinics or Walter so post this might work. 22 00:02:07,890 --> 00:02:09,810 So let's change the name. 23 00:02:11,100 --> 00:02:14,600 Let's check the stop feeling 24 00:02:18,090 --> 00:02:21,910 version is server 1. 25 00:02:22,540 --> 00:02:23,450 Let's see. 26 00:02:23,560 --> 00:02:27,300 This is the ticker symbol. 27 00:02:27,520 --> 00:02:30,290 Again right. 28 00:02:30,310 --> 00:02:38,290 So let's say now when you are going to click on this computer it has a particular IP address which was 29 00:02:38,290 --> 00:02:43,520 getting form which was getting Form D several super easy. 30 00:02:43,810 --> 00:02:54,310 So what you can do though if if the attacker if if we had if we have this network as opening network 31 00:02:54,640 --> 00:03:02,770 that is not source it's not secure at all because it does it prevent any kind of external devices to 32 00:03:03,220 --> 00:03:05,590 enter or switch system. 33 00:03:05,590 --> 00:03:16,020 Therefore when we won or when when we open a device or it might get an automatic IP address from us 34 00:03:16,050 --> 00:03:23,260 or either from the attacker there or for the chance by by getting an IP address it will be net be depend 35 00:03:23,290 --> 00:03:25,230 on us it will be like Windows. 36 00:03:25,450 --> 00:03:28,650 So it will get any introduced either from us or from the attacker. 37 00:03:28,660 --> 00:03:33,780 So let's let's configure this server of the attackers so that we can show you how it works. 38 00:03:33,790 --> 00:03:39,120 So we click here and then we click on this top kill configuration. 39 00:03:39,130 --> 00:03:49,960 So let's make this specific let's say 150 1 1 0 let's say 1. 40 00:03:49,960 --> 00:04:02,560 So OK this is the IP address which the which is set for the server of the app of the attacker. 41 00:04:02,570 --> 00:04:12,310 So now we can try to send a whinge or give the A C being let's say start IP address 1 1 0 let's say 42 00:04:13,510 --> 00:04:16,850 1 1 0 case with the wind. 43 00:04:16,870 --> 00:04:27,510 Is this one as we have set up the whinge for or 44 server on 5 5 1 2. 44 00:04:27,640 --> 00:04:28,510 So we take. 45 00:04:28,540 --> 00:04:36,580 But before can you say it on of course because we want to we want the server of the attacker might generate 46 00:04:36,670 --> 00:04:39,800 a desire to speak IP address for all the network. 47 00:04:39,850 --> 00:04:41,610 So we could save. 48 00:04:41,680 --> 00:04:42,180 Okay. 49 00:04:42,190 --> 00:04:47,560 So now let's go back and check it again. 50 00:04:48,980 --> 00:04:49,990 All right. 51 00:04:50,020 --> 00:04:51,280 Within these okay. 52 00:04:51,300 --> 00:04:51,910 No. 53 00:04:52,470 --> 00:04:53,460 Perfect. 54 00:04:53,500 --> 00:04:57,370 Now let's check this one so let's just really fight this. 55 00:04:57,400 --> 00:04:59,920 We had I feel good. 56 00:05:00,170 --> 00:05:01,550 Oh OK. 57 00:05:01,750 --> 00:05:11,020 Therefore let's try now to to open a computer or at all or a laptop and then go to configuration. 58 00:05:11,210 --> 00:05:15,900 Put it on static and put it on DCP again to see how it will be. 59 00:05:15,950 --> 00:05:17,350 So we check this one 60 00:05:21,690 --> 00:05:28,090 DCP is successful and then it was before from this server. 61 00:05:28,090 --> 00:05:37,930 Now it gets it from this server and it's very dangerous because the attacker might be very evil intention 62 00:05:37,930 --> 00:05:38,900 and die. 63 00:05:39,030 --> 00:05:41,930 And then he can try to get control of what he faces. 64 00:05:42,030 --> 00:05:45,960 So let's check and order one. 65 00:05:46,060 --> 00:05:54,160 And so if you if you just think it again probably it will take the first ip address again and again 66 00:05:54,190 --> 00:05:58,570 it will just pick any one of them as window because now he had to. 67 00:05:58,780 --> 00:06:06,220 He has two providers of server or of server which is one in the each server. 68 00:06:06,280 --> 00:06:07,920 So it's sticky. 69 00:06:07,920 --> 00:06:19,530 Again you see it takes it so let's put it back again again so we can try again if we take them as Windows 70 00:06:19,630 --> 00:06:28,250 or we can just try to click here and go back again put it here again you. 71 00:06:28,300 --> 00:06:29,650 So this is how it works. 72 00:06:30,090 --> 00:06:30,400 OK. 73 00:06:30,460 --> 00:06:36,120 So now what we want to do we want to secure all on it. 74 00:06:36,760 --> 00:06:43,600 So by doing so we will stop any kind of intrusions from here. 75 00:06:44,110 --> 00:06:45,460 I mean deport. 76 00:06:45,520 --> 00:06:55,240 So anything that we try to into or switch will not be able to connect to do so we are going to use it 77 00:06:55,240 --> 00:06:59,720 will go in and install it in India Cisco packets which called Snoop. 78 00:06:59,860 --> 00:07:02,830 So we will not deport by snooping deport. 79 00:07:02,830 --> 00:07:13,060 We will block despite these port disputes or any kind of a device we shall going through or switch to 80 00:07:13,060 --> 00:07:15,550 go to all devices will be blocked. 81 00:07:15,580 --> 00:07:17,590 Let's do so. 82 00:07:18,160 --> 00:07:21,780 We just click on switch and then we go. 83 00:07:22,470 --> 00:07:29,330 So that we made the configuration OK with cinder switch. 84 00:07:29,410 --> 00:07:36,050 Now what we can do we can try this one corner in a ball game. 85 00:07:36,130 --> 00:07:40,180 So we have it to anybody it anymore. 86 00:07:40,230 --> 00:07:40,910 All right. 87 00:07:40,980 --> 00:07:47,860 Again we type switch oil into a given month. 88 00:07:47,860 --> 00:07:50,970 Now let's let's briefly expense one thing. 89 00:07:51,030 --> 00:08:04,010 So before you so game OK well now do explore. 90 00:08:04,110 --> 00:08:13,410 Let's check this again one more time to see that B you see 1 5 0 and then this IP is let's check it 91 00:08:16,310 --> 00:08:17,660 1 9 2. 92 00:08:18,050 --> 00:08:21,550 So do you expect this IP will be communicating with this. 93 00:08:21,560 --> 00:08:22,560 Of course not. 94 00:08:22,640 --> 00:08:29,340 If we want you can just try it by going through and simulation. 95 00:08:29,390 --> 00:08:34,770 So just go here first and we can hear this message. 96 00:08:34,810 --> 00:08:37,660 Would Hear put it here. 97 00:08:37,740 --> 00:08:40,460 So with it here. 98 00:08:40,900 --> 00:08:41,360 Excellent. 99 00:08:41,910 --> 00:08:47,940 Now we're going to try to win it. 100 00:08:48,160 --> 00:08:49,640 It's it's in progress 101 00:09:02,890 --> 00:09:03,650 so let's see 102 00:09:07,710 --> 00:09:09,260 you see fit. 103 00:09:09,280 --> 00:09:16,020 Of course of course it must be failed because this one is getting an IP address from the server from 104 00:09:16,020 --> 00:09:16,620 the attacker. 105 00:09:16,620 --> 00:09:19,010 And this one still from this server. 106 00:09:19,020 --> 00:09:22,620 I'm getting Minister metro because we need to configure it yet. 107 00:09:22,710 --> 00:09:24,930 This this computer. 108 00:09:24,930 --> 00:09:27,540 Let's let's check for example. 109 00:09:27,850 --> 00:09:29,160 Let's check this. 110 00:09:29,310 --> 00:09:34,180 If we click here and then click here again for the message. 111 00:09:34,290 --> 00:09:41,000 We'll be communicating one less the IP address of this computer it gets changed so let's make it. 112 00:09:41,010 --> 00:09:42,870 Let's try to do it first. 113 00:09:42,860 --> 00:09:56,260 No go here so let's wait let's wait a moment the closest first to. 114 00:09:57,010 --> 00:09:58,300 OK. 115 00:09:58,730 --> 00:10:02,700 So go back again to 116 00:10:24,920 --> 00:10:29,550 k you see to the IP address it's 16. 117 00:10:29,650 --> 00:10:31,870 Go into my address. 118 00:10:31,870 --> 00:10:34,600 Now it's eight. 119 00:10:34,730 --> 00:10:35,750 Okay. 120 00:10:35,820 --> 00:10:41,830 So therefore if we want to communicate them now yes it would it would work. 121 00:10:41,830 --> 00:10:46,300 So let's try it here. 122 00:10:49,590 --> 00:10:49,950 Here 123 00:10:53,860 --> 00:10:56,440 and then you can go to simulation 124 00:11:31,560 --> 00:11:37,430 software you see successful because now it's working on this computer to this computer. 125 00:11:37,670 --> 00:11:38,600 It's working. 126 00:11:38,750 --> 00:11:45,050 So we have just to check this now or task was about to do snot beat. 127 00:11:45,110 --> 00:12:00,980 So Katie you now can just try to type IP address like this first as we get to change the configuration 128 00:12:00,980 --> 00:12:01,310 mode 129 00:12:04,520 --> 00:12:10,080 now let's boyfriend open now let's briefly explain how this system works. 130 00:12:10,080 --> 00:12:10,360 OK. 131 00:12:11,030 --> 00:12:18,230 So from this kind of ideas to be so we can each just see pistol vision or we can just call it denial 132 00:12:18,230 --> 00:12:19,290 of service attack. 133 00:12:19,660 --> 00:12:24,860 So when we anybody is snooping on the switch. 134 00:12:24,860 --> 00:12:30,500 So the default attitude of the DCP snooping becomes to know what does that mean. 135 00:12:30,500 --> 00:12:33,530 It means that it does it just a need. 136 00:12:33,740 --> 00:12:41,300 Any devices which any devices to begin with each server for example any devices which enter D. 137 00:12:41,300 --> 00:12:48,760 Are we disputable because we are going to stop a live report from intrusion or switch. 138 00:12:48,760 --> 00:12:49,140 Yeah. 139 00:12:49,600 --> 00:12:50,960 So. 140 00:12:51,030 --> 00:12:55,490 So it stop any DSP server type message or for an acknowledgement. 141 00:12:55,490 --> 00:12:56,060 Yeah. 142 00:12:56,180 --> 00:13:04,220 And it lowers Klein text message discovery and we guessed that therefore after enabling the to be snooping 143 00:13:04,340 --> 00:13:06,490 on ports we can only chose. 144 00:13:06,920 --> 00:13:09,540 So even the part of the administrator. 145 00:13:09,710 --> 00:13:20,470 So form this server will become untrusted because we don't set it as a specific address or specific 146 00:13:20,470 --> 00:13:26,970 suits entries which can or which has access to internet or system. 147 00:13:27,100 --> 00:13:35,080 So what we can do if any port of switch is a heavy new ideas to be server connected to eat that port 148 00:13:35,250 --> 00:13:43,940 must be the ECP stooping chopstick port to acknowledge or switch to the specific to the administrator 149 00:13:44,270 --> 00:13:45,050 server. 150 00:13:45,060 --> 00:13:52,920 So we have to put the same report as just ID even port security protect or network from the ISP service 151 00:13:52,940 --> 00:13:54,920 and starvation attack. 152 00:13:54,960 --> 00:13:56,700 We may also said oh wait. 153 00:13:56,730 --> 00:14:03,990 I mean they limit our untrusted port of switch to products and the to be starfish and attack not doing 154 00:14:03,980 --> 00:14:06,440 it but it's this on the switch. 155 00:14:06,450 --> 00:14:12,690 We have to enter the global configuration mode when we when we talk about the global configuration what 156 00:14:12,720 --> 00:14:13,320 it's like. 157 00:14:13,350 --> 00:14:19,260 So we just click here and we go to common line. 158 00:14:19,290 --> 00:14:22,820 So we just always exist. 159 00:14:23,480 --> 00:14:24,810 Okay. 160 00:14:25,110 --> 00:14:28,300 So we just type config and we know. 161 00:14:28,560 --> 00:14:29,740 So we are there. 162 00:14:29,740 --> 00:14:32,090 So this is the global configuration model. 163 00:14:32,230 --> 00:14:32,720 All right. 164 00:14:33,300 --> 00:14:43,020 So as default Delenn of all network is said he is sitting on one on one. 165 00:14:43,090 --> 00:14:46,210 So to throw into the interface. 166 00:14:46,270 --> 00:14:53,260 So for example let's say for fast internet connection or fast as he was you will if you want to see 167 00:14:53,470 --> 00:14:54,240 what is this. 168 00:14:54,280 --> 00:14:59,170 You have a judge to hover over your mouse over each port so that you can get down. 169 00:14:59,200 --> 00:15:06,210 So we override you see if it is you if if it is you will 8 your over over it. 170 00:15:06,680 --> 00:15:07,160 OK. 171 00:15:07,180 --> 00:15:07,640 You see. 172 00:15:07,660 --> 00:15:09,430 So we do the same for us. 173 00:15:09,430 --> 00:15:10,230 Check this. 174 00:15:10,240 --> 00:15:11,440 Put it here. 175 00:15:11,440 --> 00:15:11,770 All right. 176 00:15:11,770 --> 00:15:13,400 So that's how you can make it. 177 00:15:13,870 --> 00:15:14,260 OK. 178 00:15:14,290 --> 00:15:22,260 So and then you can also check the binding by typing to IP the interest to be stopping binding. 179 00:15:22,270 --> 00:15:22,720 All right. 180 00:15:22,840 --> 00:15:28,190 So now let's get into the protocol ports as a whole. 181 00:15:28,200 --> 00:15:31,260 We are going to endure the confusion what as we have been already. 182 00:15:31,260 --> 00:15:37,790 So what we are going to take therefore is a choice a p h c and then we petition y everything. 183 00:15:37,830 --> 00:15:41,530 If we don't know what type the quota Trimble condition. 184 00:15:41,790 --> 00:15:44,420 So what we need now we need to snooping. 185 00:15:44,430 --> 00:15:46,830 So we tied snooping and backstab. 186 00:15:46,980 --> 00:15:54,270 And again if we want to in that condition Mark you see we see that is information verified violin and 187 00:15:54,270 --> 00:15:54,690 so on. 188 00:15:54,690 --> 00:16:02,490 What we need we need revealing scenes or default villain is setting who is setting on is set up on one 189 00:16:02,730 --> 00:16:10,280 so we can just type realign and TAB Len in place or type 1 and then be present. 190 00:16:10,890 --> 00:16:12,040 So far so good. 191 00:16:12,060 --> 00:16:20,010 Now we have blocked all this port all of these port get get some bugs if you want to make sure if it's 192 00:16:20,010 --> 00:16:29,210 true we can just go here and try to go back to any computer. 193 00:16:29,210 --> 00:16:37,910 Let's say this one device and we're going to stop which is now reported back on static so that we can 194 00:16:37,910 --> 00:16:45,050 get an IP address from any server for either from the attacker or from us and therefore it will not 195 00:16:45,050 --> 00:16:50,420 get any IP address because we have blocked this port from the switch. 196 00:16:50,420 --> 00:16:51,980 All right so we click here. 197 00:16:51,980 --> 00:17:00,050 Again the process should be wait a little bit longer and we will not get any IP address from 1 9 2 0 198 00:17:00,050 --> 00:17:01,400 1 5 0. 199 00:17:01,400 --> 00:17:02,330 So let's check it. 200 00:17:02,360 --> 00:17:04,710 So let's wait and then it should be fade. 201 00:17:04,850 --> 00:17:09,070 Let's wait a moment just to see if we can drag this 202 00:17:12,920 --> 00:17:14,270 guest an IP address. 203 00:17:14,310 --> 00:17:15,170 Exactly. 204 00:17:15,180 --> 00:17:24,530 You see the HCV fed it gets an APB it paid IP address which is Fred is being used. 205 00:17:24,530 --> 00:17:25,110 Okay. 206 00:17:25,340 --> 00:17:32,420 So that's how it works because when we set up when we set up or was snooping so we that means we broke 207 00:17:32,540 --> 00:17:35,700 on the platform into doing the switches week. 208 00:17:35,900 --> 00:17:36,300 OK. 209 00:17:36,320 --> 00:17:42,960 So again just try to go back here and try this on yeah. 210 00:17:43,470 --> 00:17:44,100 Doing so 211 00:17:47,100 --> 00:17:49,950 weakest in IP addresses you see again failed. 212 00:17:49,990 --> 00:17:52,440 So again failed. 213 00:17:52,510 --> 00:17:53,940 So that's how it works 214 00:17:57,080 --> 00:17:57,590 now. 215 00:17:57,600 --> 00:18:02,690 It's just a matter too I know some port to be trusted. 216 00:18:02,850 --> 00:18:13,710 So that's why we now type need C.P. IP and then we typed Snoop and just therefore we chose that particular 217 00:18:13,710 --> 00:18:14,300 port. 218 00:18:14,310 --> 00:18:17,920 All right okay. 219 00:18:18,040 --> 00:18:20,870 Let me show you right now. 220 00:18:21,340 --> 00:18:21,680 Let's. 221 00:18:21,820 --> 00:18:27,540 Let's assume that we don't want to prevent this kind of access. 222 00:18:27,550 --> 00:18:35,480 We want to have this access by doing so we will make us as being a trusted external source. 223 00:18:35,590 --> 00:18:42,490 So to do so we are going to go to the terminal command that is terminal command. 224 00:18:42,490 --> 00:18:50,320 Now we should try to check on which interfaces which is going into the water to the switch. 225 00:18:50,320 --> 00:18:59,030 I mean so by doing so we just over a mouse disease interface f it all and eight. 226 00:18:59,350 --> 00:19:02,910 This one is 0 5. 227 00:19:03,030 --> 00:19:07,860 Okay and 0 6. 228 00:19:07,880 --> 00:19:11,360 Now what we can do ORS is 0 5. 229 00:19:11,390 --> 00:19:13,710 Now we have to enter that differs. 230 00:19:13,880 --> 00:19:15,140 They do need. 231 00:19:15,140 --> 00:19:16,970 We will give us access. 232 00:19:17,000 --> 00:19:18,740 So we type interface. 233 00:19:18,810 --> 00:19:24,740 And if it's a 0 5 percent. 234 00:19:25,260 --> 00:19:25,690 Okay. 235 00:19:25,690 --> 00:19:26,860 And now we are there. 236 00:19:26,990 --> 00:19:35,300 Now we will try to snap us so that we can give us access by not limited but B as being trusted. 237 00:19:35,780 --> 00:19:42,910 So we type IP address C and smoke was this. 238 00:19:42,920 --> 00:19:49,640 Now we get the option of limit DHS CPS snooping limit choice the ACP slipping chose conflict. 239 00:19:49,790 --> 00:19:51,980 We want us to be trusted. 240 00:19:51,980 --> 00:19:54,950 Now we are going to take choice and we can put quotation mark again. 241 00:19:54,950 --> 00:19:56,810 So that means we have c o. 242 00:19:56,940 --> 00:19:58,340 So the comment is OK. 243 00:19:58,340 --> 00:20:00,420 So again just put in derm. 244 00:20:00,530 --> 00:20:02,450 So now we have access. 245 00:20:02,450 --> 00:20:08,790 Now we have access to to this switch all the order but does it have access. 246 00:20:08,930 --> 00:20:10,440 So we can try it now. 247 00:20:10,460 --> 00:20:14,920 So let's go here again quick here. 248 00:20:14,960 --> 00:20:21,740 So now each should it get an IP from the server attacker from the attacker of server it should have 249 00:20:21,740 --> 00:20:25,910 get access only from these server from us. 250 00:20:25,910 --> 00:20:32,520 So you check here and again go back here excelling you see perfect. 251 00:20:32,790 --> 00:20:41,340 So just the this one it's one perfect. 252 00:20:41,390 --> 00:20:42,970 Successful again. 253 00:20:43,200 --> 00:20:49,630 Let's try because before it's Jenny waits sometimes days and sometimes days. 254 00:20:49,750 --> 00:20:54,860 Now we blog this all of over all of them all external sources except this one. 255 00:20:54,970 --> 00:20:57,540 So that's why when we are we fetching it. 256 00:20:57,730 --> 00:20:59,940 It should be only from this server. 257 00:21:00,550 --> 00:21:01,540 So on time 258 00:21:04,670 --> 00:21:05,260 perfect. 259 00:21:05,570 --> 00:21:08,940 All right so let's check this one now. 260 00:21:10,200 --> 00:21:11,530 It is six 261 00:21:14,220 --> 00:21:18,200 again. 262 00:21:18,310 --> 00:21:19,000 Perfect. 263 00:21:19,000 --> 00:21:30,850 So now guys this is a very very well known way how you can secure your network because this is the way 264 00:21:30,910 --> 00:21:42,490 that we choose to make to give access as being trusted means that do the switch say hey I believe this 265 00:21:42,490 --> 00:21:44,720 guy this guy I know him. 266 00:21:44,740 --> 00:21:50,350 So I can open my door so that it endures and manipulate my devices. 267 00:21:50,380 --> 00:21:57,020 So it's not a problem for him because he's my friend but all the older ones you know if that's if an 268 00:21:57,040 --> 00:22:07,090 attacker twice tries to do get access to a system enjoy to insert a server it is DCP server so that 269 00:22:07,090 --> 00:22:08,780 he can control the devices. 270 00:22:08,800 --> 00:22:14,650 This switch will say hey my friend I'm so sorry for your gain I'm so sorry for you because I have only 271 00:22:14,650 --> 00:22:20,770 one friend and that when is server zero I know him some time it goes on and I trust him but I don't 272 00:22:20,770 --> 00:22:21,690 trust you. 273 00:22:21,700 --> 00:22:22,340 Okay. 274 00:22:22,360 --> 00:22:23,570 So please stop. 275 00:22:23,600 --> 00:22:29,910 You know so therefore your network becomes more secure than how it was before. 276 00:22:29,920 --> 00:22:35,990 So that's how we can figure this lopping off of the S.P. server. 277 00:22:36,900 --> 00:22:44,830 So by doing so we prevent all the external sources from entering by and by giving access to only one 278 00:22:44,830 --> 00:22:45,760 trusted bot. 279 00:22:46,090 --> 00:22:53,580 So now we can check how many new vaccines are made it would cost to network. 280 00:22:53,620 --> 00:22:59,970 So by wanting to do so by wanting to do so we can just executive what happens tomorrow. 281 00:23:00,040 --> 00:23:02,650 So no no switch okay. 282 00:23:02,740 --> 00:23:06,290 So let's try to make this one the 283 00:23:09,120 --> 00:23:13,820 case successful take on ICS into this and for the older ones 284 00:23:19,090 --> 00:23:20,780 safe and successful. 285 00:23:20,960 --> 00:23:21,830 You do this in 286 00:23:28,720 --> 00:23:32,820 excellent X eggs we do this in 287 00:23:38,080 --> 00:23:39,810 case which is one of this is six. 288 00:23:39,990 --> 00:23:41,350 Okay. 289 00:23:41,530 --> 00:23:44,310 And then this one was what OK. 290 00:23:44,490 --> 00:23:44,860 All right. 291 00:23:45,210 --> 00:23:52,600 So Kiki go here again. 292 00:23:52,660 --> 00:23:53,080 Perfect. 293 00:23:53,140 --> 00:24:02,050 So now all these devices are warning or it's a default with a window IP I just get getting from the 294 00:24:02,050 --> 00:24:02,620 server. 295 00:24:02,650 --> 00:24:03,630 So we can back. 296 00:24:04,030 --> 00:24:05,900 And then we are going to type. 297 00:24:06,150 --> 00:24:14,770 Should I leave the HCV snooping and binding now stop the new presenter here we are guys. 298 00:24:14,980 --> 00:24:22,060 So this is the Mac address which we get from this particular I'm watching this particular machine belongs 299 00:24:22,060 --> 00:24:23,210 to these countries. 300 00:24:23,240 --> 00:24:25,680 You see it's so funny. 301 00:24:25,720 --> 00:24:35,860 And it's it's really working guys you know so you can get much more information about what you have 302 00:24:36,040 --> 00:24:37,230 and some stuff like that. 303 00:24:37,240 --> 00:24:44,860 It is on veal and one but all of them is unreal and one and then the type is DHS CPS snooping and the 304 00:24:44,860 --> 00:24:47,420 IP address is these one. 305 00:24:47,500 --> 00:24:50,140 You know there's this one. 306 00:24:50,140 --> 00:24:56,350 This one is the IP address and an address for each of them right here in the left side. 307 00:24:56,650 --> 00:25:04,240 So now what we can do we can try to get a notification of what we can do. 308 00:25:04,240 --> 00:25:12,760 We can try to get a notification when when a change is made on our network. 309 00:25:13,000 --> 00:25:21,250 So to do so we have to use the the command debug so that we can get the information in. 310 00:25:21,340 --> 00:25:29,710 Oh to me now why the change or a modification why why if someone is turning this system that work OK 311 00:25:31,450 --> 00:25:41,320 now let's prepare yourself for any kind of event which is made on a network so to do so we are going 312 00:25:41,320 --> 00:25:48,830 to tie you see we may be debug. 313 00:25:49,850 --> 00:25:57,740 I'd be subpoenaed as these and so being of course start again and event. 314 00:25:57,740 --> 00:26:00,520 So we check for the event. 315 00:26:00,990 --> 00:26:01,450 OK. 316 00:26:01,540 --> 00:26:03,790 Zero so we can endure it now. 317 00:26:04,160 --> 00:26:04,640 All right. 318 00:26:04,670 --> 00:26:10,250 So now we are waiting for any kind of request which is made on our network. 319 00:26:10,670 --> 00:26:11,520 So. 320 00:26:12,260 --> 00:26:12,920 All right let's. 321 00:26:13,040 --> 00:26:13,430 All right. 322 00:26:13,460 --> 00:26:14,130 So let's go. 323 00:26:14,130 --> 00:26:15,710 Here you go. 324 00:26:15,710 --> 00:26:17,470 Here some kind of 325 00:26:21,060 --> 00:26:21,450 and 326 00:26:27,460 --> 00:26:28,640 it's here. 327 00:26:30,380 --> 00:26:37,900 So you can just click again here on any computer on any device. 328 00:26:37,940 --> 00:26:39,160 Sure. 329 00:26:40,030 --> 00:26:40,640 Yeah. 330 00:26:40,700 --> 00:26:43,550 We care. 331 00:26:44,140 --> 00:26:44,670 Okay. 332 00:26:44,680 --> 00:26:55,420 So now let's go back again to static soil and then let's make a request from the Chesapeake wait you 333 00:26:55,430 --> 00:26:59,610 see automatically we get it to hey you guys. 334 00:26:59,780 --> 00:27:01,680 You see switch. 335 00:27:01,790 --> 00:27:05,750 It was your 13 is who you were nine. 336 00:27:05,750 --> 00:27:09,550 Andy it's obviously adding binding an on board as you will one. 337 00:27:09,650 --> 00:27:22,210 So let's check this one so we can just do that and what it's 0 1. 338 00:27:22,220 --> 00:27:24,410 This is it 0 1. 339 00:27:24,470 --> 00:27:25,680 So let's check this tape. 340 00:27:25,700 --> 00:27:37,450 Let's say this one or a game that's here with a laptop and let's me then guess then the request again 341 00:27:38,720 --> 00:27:42,540 excellent port 0 2 fast internet. 342 00:27:43,500 --> 00:27:45,950 So it was this one laptop. 343 00:27:46,170 --> 00:27:47,420 It's over over a mouse. 344 00:27:47,480 --> 00:27:47,940 Yeah. 345 00:27:48,000 --> 00:27:52,740 So let's check day decode one enough to give us once again 346 00:27:55,610 --> 00:28:00,440 you see excellent excellent days and the last one. 347 00:28:00,440 --> 00:28:05,760 So if you want you can do it for all of your devices it's not a program but we just want to show you 348 00:28:05,760 --> 00:28:06,800 some of them. 349 00:28:06,890 --> 00:28:08,600 So yeah. 350 00:28:08,600 --> 00:28:11,500 And reading. 351 00:28:11,630 --> 00:28:12,040 Yeah. 352 00:28:12,150 --> 00:28:14,080 So that's how old guys. 353 00:28:14,190 --> 00:28:21,930 You check a modification which is made or any request which is made on your server by your devices. 354 00:28:22,020 --> 00:28:28,590 So you'll get the information and then the time you know you get the information the time is setting 355 00:28:28,590 --> 00:28:30,630 up very excellent. 356 00:28:30,660 --> 00:28:32,130 So yeah. 357 00:28:32,910 --> 00:28:33,220 OK 358 00:28:47,710 --> 00:28:49,340 that's all for these video guys. 359 00:28:49,360 --> 00:28:53,170 We hopefully think that this video was informative for all. 360 00:28:53,230 --> 00:28:56,380 And we are looking forward to seeing you in the next video. 361 00:28:56,830 --> 00:28:57,400 Thank you.