1 00:00:01,530 --> 00:00:09,780 In this lecture we start our hands on practicing with in map so I will open terminal window and then 2 00:00:10,470 --> 00:00:13,710 I will try to use 3 00:00:16,560 --> 00:00:19,310 side scan to the exploit. 4 00:00:19,330 --> 00:00:21,210 Will PM 5 00:00:25,740 --> 00:00:38,300 so here we see the services that was enabled on the VM and also see that we put the MAC address and 6 00:00:38,300 --> 00:00:39,200 from the MAC address. 7 00:00:39,200 --> 00:00:47,000 We knew that it is an oracle virtual box VM. 8 00:00:47,590 --> 00:00:52,780 It is now try virtual scan. 9 00:00:52,970 --> 00:01:01,700 That will give us more information about the enabled services 10 00:01:05,990 --> 00:01:20,460 so here we see the difference of each service that's associated with it and open bought. 11 00:01:20,540 --> 00:01:33,830 So for example the movie or web server he's running Apache let us now try to identify the operating 12 00:01:33,830 --> 00:01:37,070 system using the capital option 13 00:01:40,710 --> 00:01:52,090 so he will see that the operating system is in X he does try to find the host for the router. 14 00:01:54,890 --> 00:02:09,710 So we see that the rotor is this character that runs this iris and you see that the only running surface 15 00:02:09,740 --> 00:02:12,110 on the rotor is the clitoris. 16 00:02:12,140 --> 00:02:22,430 So these are like you to a sprite will VM that has many services running. 17 00:02:23,150 --> 00:02:34,910 Let us now try to run he's saying cancel T5 for specific parts. 18 00:02:35,000 --> 00:02:51,720 So for example the TV and TV spots so we see that the pitch TV part of protocol is running and the HD 19 00:02:51,900 --> 00:03:04,370 is not enabled on the VM and we see that the scan was completed in about 30 seconds. 20 00:03:04,370 --> 00:03:17,130 It does use the same scan but this time with the sneaky timing so T1 to evade intrusion detection systems 21 00:03:19,690 --> 00:03:26,580 so we see that the scan was completed in about 58 seconds. 22 00:03:26,590 --> 00:03:29,990 So it is more slower than the previous one. 23 00:03:30,280 --> 00:03:42,340 So that is why it is used to evade Trojan detection systems because it runs slowly and also I will use 24 00:03:42,430 --> 00:03:55,690 another evasion technique so I will try to use the coy option so I will spoof these 25 00:03:58,820 --> 00:04:00,170 IP addresses 26 00:04:05,240 --> 00:04:18,200 and I will go to the doctor and enable debugging using the common debug IP packet detail to see 27 00:04:21,010 --> 00:04:22,100 this move package. 28 00:04:22,110 --> 00:04:29,500 Now I would give the command so I in your daughter will see that it's coming from the spoofed eye whether 29 00:04:29,540 --> 00:04:29,970 it is. 30 00:04:29,970 --> 00:04:35,710 So you two hundred and fifty and the 31 00:04:38,720 --> 00:04:46,460 two hundred let us now try to use scripts. 32 00:04:46,620 --> 00:04:52,220 So we use the script. 33 00:04:57,130 --> 00:05:07,460 That is the fourth one that will give us more detailed information. 34 00:05:07,690 --> 00:05:14,570 So here we see this information like the BIOS name the war group. 35 00:05:19,280 --> 00:05:25,850 And many other information it does use another script. 36 00:05:25,850 --> 00:05:26,180 So 37 00:05:32,560 --> 00:05:36,940 which TV site map. 38 00:05:38,870 --> 00:05:40,660 Generator. 39 00:05:41,140 --> 00:05:44,970 Script that will give us details about the site map. 40 00:05:48,520 --> 00:05:53,220 So here we see the that effective structure of the website 41 00:05:56,340 --> 00:06:01,720 so we have seen that scripts give us detailed information. 42 00:06:01,800 --> 00:06:09,120 Let us now try to work with z map which is UI for and map. 43 00:06:12,480 --> 00:06:23,940 So you will see that we can select the type of this can and by selecting the type you see that the syntax 44 00:06:23,940 --> 00:06:27,180 of the command is changed 45 00:06:30,270 --> 00:06:35,890 and here you can specify the host. 46 00:06:36,060 --> 00:06:49,320 So let us try an intense scan without being to the meta spiteful VM. 47 00:06:49,320 --> 00:07:02,250 So here we see the results of the intense scan which is uses the computer option that is like running 48 00:07:02,250 --> 00:07:06,390 the default script. 49 00:07:06,390 --> 00:07:12,990 And here you see the services that were discovered on the machine. 50 00:07:14,880 --> 00:07:28,230 So in this picture we have explored how to work with and map and have seen many options that can be 51 00:07:28,230 --> 00:07:30,180 used with it. 52 00:07:30,420 --> 00:07:37,840 And then we have seen how to work with Zainab map which is he going to look for and map.