1 00:00:00,390 --> 00:00:02,700 And map timing templates. 2 00:00:04,520 --> 00:00:10,490 So in scanning on these networks, our goal, of course, is to make discoveries as soon as possible 3 00:00:10,940 --> 00:00:12,210 without being noticed. 4 00:00:12,890 --> 00:00:17,540 And this discovery identifies to us the computers and ports that may be open. 5 00:00:18,080 --> 00:00:21,800 This next step is to obtain the necessary information. 6 00:00:22,730 --> 00:00:26,800 Our biggest obstacle, one scanning, of course, is security systems. 7 00:00:28,400 --> 00:00:35,090 That map offers different alternatives for scanning without being caught in security systems. 8 00:00:36,250 --> 00:00:42,370 They are activated by the T parameter and named in the range zero to five. 9 00:00:43,210 --> 00:00:47,200 So the T parameter is only related to timing. 10 00:00:48,210 --> 00:00:50,220 When it's used with other parameters. 11 00:00:51,230 --> 00:00:53,060 T zero paranoid. 12 00:00:54,360 --> 00:01:00,390 Only one port is scanned at a time, and it's used to send packets very slowly. 13 00:01:01,650 --> 00:01:05,130 The time difference between the two packets sent is five minutes. 14 00:01:06,200 --> 00:01:11,120 So this option is one of the modes used to bypass security systems. 15 00:01:13,370 --> 00:01:14,690 He's one sneaky. 16 00:01:15,950 --> 00:01:21,740 So this mode is used when you want to send packets quickly, but it's still slower than a normal scan. 17 00:01:23,140 --> 00:01:27,850 The time difference between two packets sent is 15 seconds. 18 00:01:28,950 --> 00:01:33,570 Of course, this option will be the second mode that's used to bypass security systems. 19 00:01:35,080 --> 00:01:36,610 Two polite. 20 00:01:37,530 --> 00:01:46,770 So in this mode, you'll be sending packets quickly, well, more quickly than 091, but certainly slower 21 00:01:46,770 --> 00:01:47,820 than a normal scan. 22 00:01:49,210 --> 00:01:54,430 So the time difference between the two packets sent is four tenths of a second, and when scanning in 23 00:01:54,430 --> 00:01:57,610 this mode, you may be visible to security systems. 24 00:01:59,040 --> 00:02:07,050 T3 is our normal operation, so this mode is the default and timing pattern used when the T parameter 25 00:02:07,050 --> 00:02:08,340 is not specified. 26 00:02:09,530 --> 00:02:13,760 So, yeah, what is the time difference between the two packets sent is a tenth of a second. 27 00:02:15,900 --> 00:02:17,820 For aggressive. 28 00:02:19,370 --> 00:02:26,000 You will use this mode when you want to send packets very quickly and and MAP will wait only one point 29 00:02:26,000 --> 00:02:27,550 twenty five seconds for a response. 30 00:02:29,020 --> 00:02:33,040 So the time difference between the two packets set is up to 10 milliseconds. 31 00:02:34,710 --> 00:02:41,970 Now, the official documentation of Unmap recommends a use of T4 for modern, reasonably modern and 32 00:02:41,970 --> 00:02:43,290 reliable networks. 33 00:02:45,780 --> 00:02:46,590 T5. 34 00:02:47,770 --> 00:02:48,790 Or insane. 35 00:02:50,060 --> 00:02:56,720 So use this mode to just send insanely fast packets and it'll only wait three tenths of a second for 36 00:02:56,720 --> 00:02:57,760 an unmapped response. 37 00:02:58,740 --> 00:03:03,180 And the time difference between two packets is up to five milliseconds. 38 00:03:04,250 --> 00:03:10,570 So, of course, this mode makes scanning super fast, but sometimes you're going to sacrifice accuracy. 39 00:03:12,480 --> 00:03:18,000 So if it fails to complete a scan within 15 minutes and MAP will give up a whole. 40 00:03:19,470 --> 00:03:27,510 Otherwise, the T5 should only be used on a fast network and high quality systems because sending packets 41 00:03:27,510 --> 00:03:35,940 that fast can affect the operation of the network or the entire system and can even cause a system failure.