1 00:00:00,240 --> 00:00:05,910 ‫Throughout the course, we're going to learn how to use and map and detail to scan the networks and 2 00:00:05,910 --> 00:00:14,040 ‫Map Network Map is a free and open source utility for network discovery and security auditing. 3 00:00:14,640 --> 00:00:21,630 ‫Many systems and network administrators also find it useful for tasks such as network inventory, managing 4 00:00:21,630 --> 00:00:28,200 ‫service, upgrade schedules and monitoring, host or service uptime and map runs on all major computer 5 00:00:28,200 --> 00:00:34,050 ‫operating systems and official binary packages are available for Linux, Windows and Mac OS X. 6 00:00:35,060 --> 00:00:41,060 ‫And Map has been used to scan huge networks of literally hundreds of thousands of machines, and map 7 00:00:41,060 --> 00:00:43,130 ‫is usually very good at documentation. 8 00:00:43,850 --> 00:00:49,550 ‫Significant effort has been put into comprehensive and up to date manpages white papers, tutorials 9 00:00:49,550 --> 00:00:50,920 ‫and even a whole book. 10 00:00:51,620 --> 00:00:58,640 ‫You can visit and map Dawjee to find out more about in Map while and Map comes with no warranty. 11 00:00:59,210 --> 00:01:02,690 ‫It is well supported by a vibrant community of developers and users. 12 00:01:03,470 --> 00:01:09,740 ‫It's one of the most well-known tools of the network security domain, and indeed, with a lot of facilities, 13 00:01:09,740 --> 00:01:11,150 ‫it's very powerful. 14 00:01:11,930 --> 00:01:18,230 ‫In addition to the classic command line and map executable, the Map Suite includes an advanced, gooey 15 00:01:18,230 --> 00:01:26,120 ‫and results viewer Zen Map, a flexible data transfer redirection and debugging tool, and get a utility 16 00:01:26,120 --> 00:01:32,180 ‫for comparing scan result and diff and a packet generation and response analysis tool. 17 00:01:32,430 --> 00:01:40,610 ‫ENPI End Map uses raw IP packets in novel ways to determine what hosts are available on the network. 18 00:01:41,740 --> 00:01:44,110 ‫Which ports of these hosts are accessible? 19 00:01:44,860 --> 00:01:46,720 ‫What services those hosts are offering? 20 00:01:47,690 --> 00:01:49,310 ‫What operating systems are running? 21 00:01:50,480 --> 00:01:56,630 ‫What type of packet filters firewalls are in use and dozens of other characteristics? 22 00:01:57,680 --> 00:02:03,470 ‫Beyond all, this end map has its own scripting engine and allows developers to develop new modules 23 00:02:03,470 --> 00:02:07,990 ‫in the following lectures to discover the network will perform the following within man. 24 00:02:08,860 --> 00:02:12,350 ‫First, we'll use Ping Scan to find out the hosts in the network. 25 00:02:13,040 --> 00:02:19,460 ‫Then we'll use different types of port scan to find the open or accessible ports will detect the services 26 00:02:19,460 --> 00:02:21,500 ‫running on the port and their versions. 27 00:02:22,160 --> 00:02:25,040 ‫We'll try to learn the operating system running on the systems. 28 00:02:25,710 --> 00:02:31,700 ‫After that, we'll see how to use scripts within maps scans and we'll learn some important scripts as 29 00:02:31,700 --> 00:02:32,030 ‫well. 30 00:02:32,540 --> 00:02:38,570 ‫And maps send some packets to discover the network to prevent security devices from blocking our packets. 31 00:02:38,900 --> 00:02:40,940 ‫Here's where we're going to learn some timing tricks. 32 00:02:41,600 --> 00:02:47,840 ‫Then we'll see what we can do more of to bypass security devices such as packet filters, i.d.s or IPS. 33 00:02:48,530 --> 00:02:50,740 ‫Here there's an Nmap command example. 34 00:02:50,750 --> 00:02:56,240 ‫Let's see some basic parameters of the map command and map is, of course, the command itself. 35 00:02:57,380 --> 00:02:57,820 ‫Yes. 36 00:02:57,980 --> 00:02:59,630 ‫Is to define the scan type. 37 00:02:59,780 --> 00:03:06,080 ‫If you use TSS with uppercase T as seen in the slide, it means you want to run a TCP scan. 38 00:03:06,920 --> 00:03:09,100 ‫We'll see the important scan types in detail. 39 00:03:10,120 --> 00:03:14,890 ‫If you don't use this parameter and you have the administrative privileges on the computer where you're 40 00:03:14,890 --> 00:03:21,640 ‫using in map since scan as a default scan type, if you don't have the admin privileges on the computer, 41 00:03:22,030 --> 00:03:23,500 ‫TCP scan will run. 42 00:03:24,480 --> 00:03:28,440 ‫Destination IP address is the only required parameter to run this command. 43 00:03:29,470 --> 00:03:36,250 ‫It means you can run the map command like and map one seven two eight one six nine nine one three nine. 44 00:03:37,120 --> 00:03:40,690 ‫This is the IP address of the target machine, which you want to scan. 45 00:03:42,170 --> 00:03:46,880 ‫You can either give a single IP address or give an IP block or an IP range as a target. 46 00:03:47,330 --> 00:03:48,230 ‫But we'll see that soon. 47 00:03:49,180 --> 00:03:52,180 ‫Destination ports are the port numbers that you want to scan. 48 00:03:53,300 --> 00:03:58,310 ‫If the target port numbers are not given to the command, top 1000 ports will be scan. 49 00:03:59,480 --> 00:04:02,480 ‫Be careful, I didn't say the first thousand ports. 50 00:04:02,960 --> 00:04:05,420 ‫I said the top 1000 ports. 51 00:04:06,320 --> 00:04:09,560 ‫That means the most used thousand ports will be scanned. 52 00:04:10,560 --> 00:04:14,430 ‫There are different ways to enter destination ports, and we'll see them in detail.