1 00:00:00,730 --> 00:00:02,860 Thirty five in mapping scam. 2 00:00:04,770 --> 00:00:06,870 And map espie target. 3 00:00:07,970 --> 00:00:14,060 So the Skin-tight lists the host in the specified range that will respond to a ping. 4 00:00:15,290 --> 00:00:20,930 Allows you to determine which computers are online rather than which ports are open. 5 00:00:21,920 --> 00:00:25,370 So basically there are four methods in MAP for scanning. 6 00:00:26,510 --> 00:00:30,760 It will send an ICMP echo request packet to the target system. 7 00:00:31,740 --> 00:00:41,790 And if an ICMP echo reply is received, then the system turns on and ICMP packets are not locked. 8 00:00:42,820 --> 00:00:52,260 If there's no response to the ICMP ping and map attempts TCP ping to determine whether ICMP is blocked 9 00:00:52,260 --> 00:00:54,360 or whether the host is actually online. 10 00:00:56,940 --> 00:01:03,240 The TCP ping sends a signal or packet to any port on the remote system and of course, the default is 11 00:01:03,240 --> 00:01:03,480 80. 12 00:01:05,520 --> 00:01:10,680 If reset or a Sinak is return, the remote system won't go online. 13 00:01:12,160 --> 00:01:20,350 And if the remote system does not respond, it is offline or the selected port is filtered in and therefore 14 00:01:20,350 --> 00:01:21,430 does not respond to any. 15 00:01:23,560 --> 00:01:33,670 So when you run around and mapping scan as root, the default will be to use the ICMP and ACT methods. 16 00:01:35,300 --> 00:01:41,720 However, this method may not work correctly on all networks, especially where ping packets are prohibited. 17 00:01:43,640 --> 00:01:50,120 Let me show you an example, so we'll make an active discovery on the network where the virtual computers 18 00:01:50,120 --> 00:01:51,440 are that we have established. 19 00:01:52,450 --> 00:01:58,930 So for this, let's open all of the virtual computers that we have installed, open virtual box, open 20 00:01:58,930 --> 00:02:08,280 county, then extend out zero to two one five, open Métis, voidable zero to do that for one to ten 21 00:02:08,300 --> 00:02:09,850 point zero to 247. 22 00:02:10,480 --> 00:02:19,540 Open Windows seven 10 zero to DOT six and then log in to county Linux VMS username root password to 23 00:02:19,540 --> 00:02:19,810 her. 24 00:02:20,750 --> 00:02:21,560 Open terminal. 25 00:02:22,460 --> 00:02:23,780 And right, this command. 26 00:02:24,740 --> 00:02:31,070 And Matt Aspey 10 zero dot 2.0 slash 24 Prusiner. 27 00:02:32,540 --> 00:02:34,550 And the scan results appear. 28 00:02:35,710 --> 00:02:40,030 And we can see that the computers are open right here. 29 00:02:46,920 --> 00:02:48,840 And map, no ping scanning. 30 00:02:49,930 --> 00:02:58,090 So if you scan with a map and parameter, it accepts that the target threads are open, scans all the 31 00:02:58,090 --> 00:03:00,270 ports for each type without pinging. 32 00:03:01,600 --> 00:03:06,240 So it could take a long time to detect master servers, especially in large networks. 33 00:03:08,540 --> 00:03:11,450 Use and map, pen target.