1 00:00:00,240 --> 00:00:01,770 And map X scanning. 2 00:00:03,600 --> 00:00:12,210 So unmap XCAP, it's used to analyze the status of firewall rules on computers with a firewall, so. 3 00:00:13,130 --> 00:00:18,080 How does a firewall allow incoming requests to be answered? 4 00:00:19,390 --> 00:00:23,530 What is the firewall status, is it stateful or not? 5 00:00:24,950 --> 00:00:29,420 So this is the scan that will allow us to see if the port is filtered. 6 00:00:30,880 --> 00:00:33,670 The scan is an example of a hidden scan. 7 00:00:35,450 --> 00:00:39,860 Because with his skin, we can scan the target systems without logging. 8 00:00:42,150 --> 00:00:45,330 And Matt performs the act, scanning as follows. 9 00:00:46,910 --> 00:00:52,610 And maps and packets with the ACT flag set to one going to the destination port. 10 00:00:54,040 --> 00:01:00,730 And if the reset package is coming from my targeted site unfiltered. 11 00:01:02,010 --> 00:01:09,060 If the export unreachable response is received from the target system, the port is filtered. 12 00:01:10,340 --> 00:01:14,210 For example, let's run X scans for the medicine voidable vem. 13 00:01:15,400 --> 00:01:22,000 Open virtual box open, carry Linux, open Métis, voidable and log in to Kaui Linux VMD. 14 00:01:22,950 --> 00:01:25,860 Username root password tour. 15 00:01:27,170 --> 00:01:38,660 Open terminal and right, this command and map, then dot zero, dot 244 as a V top 10 reason reason. 16 00:01:39,700 --> 00:01:42,490 And scan results appear. 17 00:01:44,190 --> 00:01:47,880 So as you can see and map sent packets to the target string. 18 00:01:48,920 --> 00:01:51,020 And then lists the results.