1 00:00:00,840 --> 00:00:03,240 TCB Singh, a scenic port. 2 00:00:04,500 --> 00:00:09,030 So the TCP Sea is a synchronization port scanner. 3 00:00:09,240 --> 00:00:19,350 Shorten is a main sports kind of regular model TCP services using a rousing scan, reducing the numbers 4 00:00:19,740 --> 00:00:26,790 a number of packers as it never completes a three way handshake to run the TCP is a synchronization 5 00:00:27,030 --> 00:00:35,710 kind of maxillary model within a specified the interface is so set, the port changed to the first thousand 6 00:00:35,820 --> 00:00:44,220 ports set to are host to the target range of our laboratory and set the number of concurrent threats 7 00:00:44,220 --> 00:00:49,290 to 250 256 to the US to speed up the scan. 8 00:00:49,880 --> 00:00:51,030 Here now I will. 9 00:00:52,020 --> 00:00:59,580 Um, I will start our Metasploit framework actually not Metasploit Metasploit BBL. 10 00:00:59,820 --> 00:01:07,290 So this is the vulnerable Linux machine that has a lot of what you can use Windows civil here. 11 00:01:07,630 --> 00:01:11,400 It doesn't matter because we will, uh, do just that. 12 00:01:11,400 --> 00:01:12,570 Uh, Port scan here. 13 00:01:13,410 --> 00:01:18,540 So starting up here, so now let's uh. 14 00:01:18,990 --> 00:01:24,600 So this Metasploit here is in our, um uh, local area network here. 15 00:01:24,600 --> 00:01:31,070 So they, uh, share the in lan, um, networking. 16 00:01:31,080 --> 00:01:37,500 So this uh, find out what what is our IP address starting? 17 00:01:37,950 --> 00:01:40,380 So as you can see it, netmask is, uh, here. 18 00:01:40,380 --> 00:01:46,890 So on a changeable part of our IP, this is, uh, last um, no. 19 00:01:47,220 --> 00:01:47,700 So. 20 00:01:48,900 --> 00:01:53,640 Now we will actually slugging immersive admin, massive admin. 21 00:01:54,000 --> 00:01:54,300 Yes. 22 00:01:54,810 --> 00:02:02,610 So we look then and here, uh, we will, uh, start Metasploit Framework immersive console. 23 00:02:03,890 --> 00:02:04,270 Here. 24 00:02:06,050 --> 00:02:07,820 And the Missile Council is starting. 25 00:02:13,310 --> 00:02:13,640 Here. 26 00:02:15,390 --> 00:02:23,130 And now, uh, we will, uh, search for, uh, search for port scan here, search. 27 00:02:27,040 --> 00:02:32,380 And this you can see here, we have Cinque Ports scanner here, so this is the tissue paper scanners, 28 00:02:33,340 --> 00:02:43,510 but it uses, uh, synchronization and uh, does not does not, um it, uh, the three way handshake. 29 00:02:43,960 --> 00:02:48,430 So this could completes its never completes three one three way handshake. 30 00:02:48,970 --> 00:02:51,580 So, uh, now let's use this. 31 00:02:53,170 --> 00:02:55,240 Scene scene scan here. 32 00:02:55,540 --> 00:02:58,270 So use auxiliary scanners. 33 00:02:59,230 --> 00:03:08,380 Port scan or scan, and it's around here, and uh, let's show options here, as you can see here, 34 00:03:08,380 --> 00:03:12,640 we have one thread sampling exercise delays to reports. 35 00:03:13,560 --> 00:03:15,430 So let's. 36 00:03:18,320 --> 00:03:24,080 Make ports one to one thousand not 10000 feet, as you can see, there's a 10000. 37 00:03:24,650 --> 00:03:31,730 So said ports, one to a 1000 here and a. 38 00:03:33,080 --> 00:03:37,340 We will use the target host who set. 39 00:03:39,120 --> 00:03:49,200 Host here and our IP address points zero and 24, because this is a uh, I still consider the netmask 40 00:03:49,200 --> 00:03:55,380 is one four and um, are these two, uh, with this month here? 41 00:03:55,680 --> 00:03:57,750 Uh, these are the four here. 42 00:03:58,110 --> 00:04:03,600 Uh, these the Metasploit actually will scan from zero to 255. 43 00:04:03,600 --> 00:04:06,360 So as you can see here, we have a threat here. 44 00:04:06,360 --> 00:04:08,950 The number of concrete threats marks one. 45 00:04:09,480 --> 00:04:11,850 So we will, uh, make threats. 46 00:04:12,110 --> 00:04:13,920 Uh, one per host here. 47 00:04:14,310 --> 00:04:25,440 So said it's, uh, two hundred fifty five here, for example, 155 actually not under 256 years under 48 00:04:25,440 --> 00:04:26,200 56. 49 00:04:27,060 --> 00:04:33,600 And after that, uh, we will run out, uh, runner scanning, uh, accelerator run. 50 00:04:35,410 --> 00:04:39,820 So as you can see our own time here, you don't have permission to capture on that device or that operation 51 00:04:39,820 --> 00:04:40,420 not permitted. 52 00:04:41,470 --> 00:04:44,950 Okay, so then uh. 53 00:04:49,070 --> 00:04:50,220 We have to run it. 54 00:04:50,260 --> 00:04:55,830 Um, you have to run it in with the command and support console here. 55 00:04:56,420 --> 00:04:59,240 Uh, so you enter the password. 56 00:05:00,710 --> 00:05:01,160 And. 57 00:05:02,610 --> 00:05:04,500 Immersive console is starting here. 58 00:05:08,600 --> 00:05:10,340 So search. 59 00:05:12,380 --> 00:05:25,580 Ports can scan and use auxiliary garnish boards, scan on is seen here and then so options will change 60 00:05:26,480 --> 00:05:30,380 are hosts ships that are hosts. 61 00:05:32,700 --> 00:05:45,110 It's from zero to actually from zero, 24 year, and then our ports here is that our ports are not our 62 00:05:45,140 --> 00:05:48,530 ports is ports, uh, one to one thousand. 63 00:05:50,460 --> 00:05:50,970 And. 64 00:05:53,720 --> 00:05:56,060 Let's set the threats here, threats. 65 00:06:00,610 --> 00:06:03,260 Mattresses 256 and run. 66 00:06:19,390 --> 00:06:23,020 They are actually running now and scanning.