WEBVTT

00:01.030 --> 00:02.410
Now what is about?

00:03.240 --> 00:08.250
The bot is a virtual location where networking communication starts and ends in a nutshell.

00:09.360 --> 00:14.460
So for more in-depth explanation, we need to establish a little background information.

00:14.490 --> 00:27.960
There are two kinds of network bots on each computer 65,000 and 536 E of each for a total of 131,082

00:27.990 --> 00:29.220
network bots.

00:29.670 --> 00:34.200
And these are considered as TCP and UDP OC.

00:35.080 --> 00:41.560
Now each computer has an Internet protocol, the IP address, which is how the network knows which computer

00:41.560 --> 00:42.670
to send packets to.

00:42.970 --> 00:49.870
So if you send a packet to the IP address, the computer knows what to allow the packet to based on

00:49.870 --> 00:51.790
application or packet contents.

00:52.330 --> 00:57.040
Each service running on the computer needs to listen on a designated board.

00:57.870 --> 01:07.890
So the first 1023 TCP ports are the well known ports reserved for applications like FTB, the 21, TB

01:07.890 --> 01:10.110
80, or as such, the 22.

01:10.920 --> 01:17.850
And the internet assigned numbers authority the IANA reserves these points to keep them standardized

01:18.330 --> 01:30.570
dxb ports from 1024 to 49000 and 151 are available for use by services or applications and you can register

01:30.570 --> 01:31.530
them with IANA.

01:31.680 --> 01:34.930
So they are considered semi reserved boards.

01:35.100 --> 01:39.720
49,152 and higher are free to use.

01:39.750 --> 01:46.740
Now let's start with board scanning basics about scanner since TCP or UDP network packet and ask the

01:46.740 --> 01:48.690
board about their current status.

01:48.720 --> 01:54.780
The three types of responses are below, which is open or accepted the computer response and ask if

01:54.780 --> 01:59.400
there are anything it can do for you, closed or not listening.

01:59.430 --> 02:05.600
The computer responds that this port is currently in use and unavailable at this time or filter drop

02:05.610 --> 02:06.270
locked.

02:06.480 --> 02:13.530
The computer doesn't even bother to respond, so we either have a respond or without respond or we have

02:13.560 --> 02:16.290
a response that the bot is currently in use.

02:18.290 --> 02:20.510
Now let's start with scanning techniques.

02:20.780 --> 02:28.640
Now, by the way, this is just a general idea about the scanning techniques we will have in depth about

02:28.640 --> 02:30.130
the map scanning techniques.

02:30.140 --> 02:30.380
No.

02:31.340 --> 02:35.360
And in theory, we and we will have the hands on later on.

02:35.420 --> 02:36.740
First the Bing scan.

02:36.770 --> 02:38.480
This is the simplest scan.

02:38.510 --> 02:46.550
A Bing scan looks for any ICMP replies indicates if a target is alive, ECP have opened a fast and common

02:46.550 --> 02:55.640
scan that request and EG SDK or EC or acknowledge packet from a computer also called a Syn, which means

02:55.640 --> 02:59.430
a synchronization or synchronized scan OC.

03:00.420 --> 03:07.110
PCB connect similar to the PCB half open scan, but the PCB Connect scan completes the PCB connection.

03:08.270 --> 03:11.510
UDP, which is a slower than TB scan.

03:11.690 --> 03:17.900
IDB scanner works best when you send a specific payload to target such as DNS request.

03:18.290 --> 03:24.500
And we have the stealth scanning quiet and an obvious stealth scanning is commonly used by hackers for

03:24.500 --> 03:25.370
this reason.

03:26.440 --> 03:26.770
Now.

03:26.770 --> 03:29.200
What are the difference between TB and TB?

03:29.320 --> 03:34.600
Now we learn that we have TB connect you TB still scanning this we have open sin.

03:34.600 --> 03:34.960
Sin?

03:35.170 --> 03:35.980
What is that?

03:36.160 --> 03:37.910
We will talk about it right away.

03:37.960 --> 03:44.530
TCP and UDP are the two most common protocols used for the TB networks or the Internet protocol networks.

03:45.510 --> 03:51.210
ECB or transmission control protocol is a nice, orderly transaction protocol.

03:52.200 --> 03:57.840
DCP cents each bucket in order, complete with error checking, verification and three way handshake

03:57.840 --> 04:02.850
to confirm each bucket is successful, which is the sin sin ec and EC.

04:03.120 --> 04:08.760
Now, I'm assuming that you have a simple idea of how TCB works, so I will move on.

04:10.830 --> 04:11.100
Now.

04:11.100 --> 04:14.520
YouTube doesn't have any checking, but tends to be faster.

04:15.240 --> 04:21.210
And live streaming and online video games often use YouTube for this reason because it is faster.

04:21.360 --> 04:27.210
UDP is a connection list protocol, so programs that use YouTube just send the data and if you miss

04:27.210 --> 04:31.190
a packet you will never get it again because it is a connection list.

04:31.200 --> 04:34.890
There are no three way handshaking as we learned from here the since in.

04:35.970 --> 04:41.910
So that's why it is faster and connection this now again I'm assuming that you are familiar or have

04:42.240 --> 04:47.190
a simple idea what is the TCB, what is the UDP and how they works?

04:47.700 --> 04:50.130
In a nutshell, let's say so.

04:50.130 --> 04:54.420
If you are not, please, you can just google it at how TCP works.

04:54.420 --> 04:56.850
Just read the simple article.

04:56.850 --> 04:57.870
It's no big deal.

04:57.930 --> 05:04.350
What we need here is you need to have a just a simple idea how TCP works.

05:04.350 --> 05:10.410
The three three way are checking verification, checking the connection lists and the difference between

05:10.410 --> 05:10.860
these three.

05:10.860 --> 05:17.880
And you'd be just as simple as that just type difference or TCP versus UDP and read a simple article

05:17.880 --> 05:19.020
and you will be fine.
