WEBVTT

00:01.450 --> 00:07.090
Hello everyone in the previous review we have discussed about the tiger scoping and the information

00:07.090 --> 00:07.500
gathered.

00:07.570 --> 00:13.270
So when you're performing up in Britain they know that the information that has been gathered and the

00:13.270 --> 00:19.090
target that has been defined in this school is essential to understand how the company activity needs

00:19.090 --> 00:20.070
to be.

00:20.200 --> 00:26.350
So once that has been sick or you move forward to start the deep assessment and penetration testing

00:26.350 --> 00:33.610
activity now and this we do talk about the various outlooks that we have got from the different activities

00:33.640 --> 00:35.570
performed during the penetration.

00:35.680 --> 00:38.430
And even the system in short.

00:38.500 --> 00:46.390
So if you recall we have used various tools during the year puti activity with tools for scanning and

00:46.390 --> 00:50.780
finding information like if you recall that we do a vertical innocence.

00:50.800 --> 00:53.240
We have used and map photo reconnaissance.

00:53.240 --> 00:55.890
We had used to select three student and ask.

00:55.960 --> 01:02.140
And then for the scanning review we had to say and map and then for that reassessment we had used to

01:02.220 --> 01:04.430
Leganes us and converse.

01:04.450 --> 01:08.050
So put each other tools that you use during your activity.

01:08.110 --> 01:10.040
You'll get some of those.

01:10.070 --> 01:16.900
Of course nice to be documented in your report to make sure that every time you use a tool and you get

01:16.900 --> 01:22.800
some of that is important you take some of your paper screenshot of a fish anything.

01:22.830 --> 01:29.260
So just have a quick recap of what kind of clockworks we had received from my nieces and other groups

01:29.600 --> 01:31.720
to give us a pen map if you recall.

01:31.750 --> 01:34.840
Once you start DNA scan you get information like this.

01:34.850 --> 01:38.250
This is just a sample of file reference.

01:38.380 --> 01:43.450
Here you can see I got the information of all the folks that are open on the day more.

01:43.450 --> 01:46.450
So now this is real time.

01:46.450 --> 01:49.710
So we're in all the other ports are closed.

01:49.720 --> 01:56.620
So so is bashed up 271 foliation to the port open depending on what kind of services are running on

01:56.620 --> 01:57.200
those.

01:57.200 --> 02:03.480
So as this one is an apache so mystically a sober posting the application.

02:03.580 --> 02:10.980
So it has the ports 80 idiot in it you need to open an additional deports or close up.

02:11.130 --> 02:12.670
They don't manage to scan.

02:12.730 --> 02:19.560
I can see the uproar that tells me the worst turning on this remote server is next.

02:19.630 --> 02:24.460
So it's been like this needs to be taken when you are running the scan.

02:24.640 --> 02:26.920
This is what you will be presenting to the claim.

02:26.950 --> 02:29.040
Then you put them into the country.

02:29.290 --> 02:32.770
In the case of Messias the output of a something like this.

02:32.920 --> 02:40.300
So it tells me in the sense that there is standard we're putting a virus named IP address on this canvas.

02:40.300 --> 02:44.210
Dan what is the oil that is running on that particular machine.

02:44.290 --> 02:50.200
When these have been identified on any form to the critical activity high medium low and so on and then

02:50.560 --> 02:54.810
a brief discussion about each of the ability that has been different.

02:54.880 --> 02:59.840
So you can see it has been there is that my best read.

02:59.870 --> 03:01.130
The Could Goldsman.

03:01.270 --> 03:04.860
Those in orange put to medium and so on.

03:05.100 --> 03:08.580
Bruce Lychnis look up we have worked like this.

03:08.580 --> 03:14.620
So then to performant and look up on and boom and it tells you the names of that preserved them.

03:14.650 --> 03:21.020
Here is the old what the racial conductor tourists were for an evil bill for anything where they have

03:21.120 --> 03:25.540
any hopes that it goes through before reaching that particular destination.

03:25.660 --> 03:30.640
And there's obviously as you and getting a better understanding of the addicted.

03:30.670 --> 03:35.830
So here you can see but each and every tool you are using for each and every fish you are performing

03:35.830 --> 03:42.800
on the Frank's network claims application you have to take screen shots for those you have full bottom

03:42.870 --> 03:48.240
in because ultimately in the final document is what the client will be able to see.

03:48.250 --> 03:54.460
So they will not be knowing whether you actually have done a scan or not that you actually got some

03:54.460 --> 03:57.670
of them not working properly.

03:57.830 --> 04:04.660
But to put that would only be more clear to the Langlands you need to be in charge in the next review

04:04.950 --> 04:07.840
to discuss about the extractable validity.

04:07.840 --> 04:12.870
So here we are just about an understanding of what kind of work and what kind of funding you get during

04:12.880 --> 04:15.230
the when the assessment in addition to.
