1 00:00:01,080 --> 00:00:06,530 Hello, my name is Stephan, and in this lecture we will learn how to scan random targets on the internet 2 00:00:06,540 --> 00:00:07,350 and Nmap. 3 00:00:07,380 --> 00:00:14,730 A powerful network scanning tool, offers a fascinating feature that allows researchers to conduct scans 4 00:00:14,730 --> 00:00:17,310 against random targets on the Internet. 5 00:00:17,340 --> 00:00:22,770 Although it's important to note that aggressive scanning without permission is not recommended and may 6 00:00:22,770 --> 00:00:30,540 be illegal in certain countries, and generating a sample of random hosts can be valuable for research 7 00:00:30,540 --> 00:00:33,810 purposes related to publicly accessible hosts. 8 00:00:33,810 --> 00:00:38,670 So let's explore how to generate random hosts as targets for Nmap scans. 9 00:00:38,670 --> 00:00:48,990 So to generate a list of n random target hosts, you can use this Nmap command Nmap lowercase e uppercase 10 00:00:49,020 --> 00:00:49,590 L here. 11 00:00:49,590 --> 00:00:52,950 So we will do 20 here and now. 12 00:00:53,490 --> 00:00:57,450 Here we are generating 20 random hosts. 13 00:00:58,510 --> 00:01:00,400 So here, let's actually wait. 14 00:01:00,550 --> 00:01:01,750 And here. 15 00:01:01,750 --> 00:01:07,380 And here, as you can see here, we scanned randomly and there is zero hosts up. 16 00:01:07,390 --> 00:01:16,840 So now let's delve into the prevalence of ICMP Internet control message protocol on remote servers. 17 00:01:16,840 --> 00:01:21,580 And we will launch a host discovery scan against three random targets. 18 00:01:21,580 --> 00:01:23,620 So Nmap is n. 19 00:01:23,620 --> 00:01:32,440 So this is a host discovery and lowercase E uppercase R and we will do three here and here. 20 00:01:33,190 --> 00:01:36,340 The scan results will display information about a scan and host. 21 00:01:36,340 --> 00:01:41,830 In this case there is a zero hosts up, so let's actually make it 50 so we will have more chance to 22 00:01:41,830 --> 00:01:48,520 get the online hosts here and here you can use the arrow keys to see the. 23 00:01:50,150 --> 00:01:52,030 A percentage of the process. 24 00:01:52,040 --> 00:01:54,230 And here it's 9400. 25 00:01:54,230 --> 00:01:58,850 And as you can see here, there's a three hosts up. 26 00:01:58,850 --> 00:02:02,150 And here I can make a technologies.com and so on. 27 00:02:02,150 --> 00:02:10,820 So the scan results will display information about the scanned host, such as their IP addresses, responsiveness, 28 00:02:10,820 --> 00:02:18,680 their domain if they have any, and latency and this is the simple sample output that Nmap will give 29 00:02:18,680 --> 00:02:19,370 it to you. 30 00:02:19,380 --> 00:02:23,300 And let's actually learn how it works here, right? 31 00:02:23,300 --> 00:02:32,210 So by using the Nmap, lowercase and uppercase R option followed by some number here and Nmap generates 32 00:02:32,240 --> 00:02:38,660 a specified number of external IP addresses and utilizes them as a targets in the scan. 33 00:02:38,660 --> 00:02:43,640 So this target assignment can be combined with any other scan options as needed. 34 00:02:43,640 --> 00:02:49,880 So while this feature can be valuable for internet research, caution should be exercised when using 35 00:02:49,980 --> 00:02:54,480 it, and Nmap has no control over the external IP addresses. 36 00:02:54,480 --> 00:03:01,590 It generates meaning that the generated list may include critical machines under heavy surveillance. 37 00:03:01,590 --> 00:03:09,120 So keep in mind, and to evade to avoid any unintended consequences, it's important to use this feature 38 00:03:09,120 --> 00:03:11,070 responsibly and ethically. 39 00:03:11,070 --> 00:03:12,600 And there's also more here. 40 00:03:12,600 --> 00:03:19,020 So if you want to generate an unlimited number of IP addresses and run the scan indefinitely, you can 41 00:03:19,020 --> 00:03:23,730 use Nmap, lowercase, E, uppercase R here and zero option. 42 00:03:23,910 --> 00:03:30,450 For example, if you're interested here in this case, sorry, it's not zero, so zero option and here 43 00:03:30,450 --> 00:03:36,660 we will scan it indefinitely until the IP addresses end or we have some error from program. 44 00:03:36,660 --> 00:03:37,140 Right. 45 00:03:37,820 --> 00:03:44,600 And here, for example, if you are interested in finding random online dnfs here network file system 46 00:03:44,600 --> 00:03:49,610 shares, you could execute this command here Nmap. 47 00:03:50,060 --> 00:03:51,860 First we will enter the port here. 48 00:03:51,860 --> 00:04:02,630 So because NFS network file system uses 2049 for 2049 port and here we will use open and I error here. 49 00:04:02,630 --> 00:04:11,150 So here we will scan open the online machines that uses this port. 50 00:04:11,150 --> 00:04:14,030 And this port is open in that machine here. 51 00:04:14,030 --> 00:04:17,630 So we will scan it on unlimited here and here. 52 00:04:17,630 --> 00:04:20,790 As you can see here, we have like. 53 00:04:21,780 --> 00:04:22,140 Here. 54 00:04:22,140 --> 00:04:25,010 As you can see here, it's running all the way. 55 00:04:25,020 --> 00:04:29,520 So here and this is also legal issues with port scanning here. 56 00:04:29,520 --> 00:04:35,340 So it's essential to be aware of the legal implications surrounding port scanning. 57 00:04:35,340 --> 00:04:41,790 Engaging in port scanning without proper authorization is generally unwelcome and even illegal in certain 58 00:04:41,790 --> 00:04:42,750 jurisdictions. 59 00:04:42,750 --> 00:04:48,420 And before conducting any scanning activities, it's crucial to research and understand the laws and 60 00:04:48,420 --> 00:04:51,810 regulations in your local jurisdiction. 61 00:04:51,810 --> 00:04:57,750 So Nmap provides comprehensive documentation on the legal issues associated with port scanning, which 62 00:04:57,750 --> 00:05:01,320 can be found on their websites here. 63 00:05:01,320 --> 00:05:07,830 Let's actually go there so we will go nmap.org here. 64 00:05:07,860 --> 00:05:13,470 Book and legal issues dot HTML. 65 00:05:13,620 --> 00:05:23,370 So here I highly recommend that anyone considering internet wide scanning takes the time to read and 66 00:05:23,370 --> 00:05:25,140 understand these resources here. 67 00:05:25,140 --> 00:05:28,410 There is also, as you can see here, security list, security tools here. 68 00:05:28,410 --> 00:05:31,770 So there might be some error legal issues here. 69 00:05:31,770 --> 00:05:36,060 So they might be changed this link here. 70 00:05:36,060 --> 00:05:41,580 So but here you can see we also can Google it here. 71 00:05:41,610 --> 00:05:45,720 We can also DuckDuckGo it here and here. 72 00:05:45,720 --> 00:05:54,480 Nmap legal uses and here we will go to Nmap official website here and that's it. 73 00:05:54,480 --> 00:05:57,390 So yes, we need to use this here. 74 00:05:57,480 --> 00:05:58,620 So that's it. 75 00:05:58,620 --> 00:06:04,290 And as you can see here, when used properly, Nmap helps protect your network from invaders and but 76 00:06:04,290 --> 00:06:10,740 when you use improperly, Nmap can in rare cases of course get you sued, fired, expelled, jailed 77 00:06:10,740 --> 00:06:14,070 or banned by your Internet service providers. 78 00:06:14,070 --> 00:06:19,650 So reduce your risk by reading this legal guide before launching Nmap here. 79 00:06:19,650 --> 00:06:25,870 So there's a here as you can see, there's a port scanning is not crime and the strong opinions on a 80 00:06:25,870 --> 00:06:28,540 port scanning legality and morality. 81 00:06:28,540 --> 00:06:35,080 And here, as you can see here, I love BMW they're nice car here M3, I think. 82 00:06:35,080 --> 00:06:35,740 Yes. 83 00:06:35,740 --> 00:06:42,340 And here you have you can read all of this chapter to understand the legal uses that comes with scanning 84 00:06:42,340 --> 00:06:43,240 ports here. 85 00:06:43,240 --> 00:06:45,790 So I'm waiting you in next lecture.