WEBVTT

00:00.990 --> 00:01.520
Okay.

00:02.010 --> 00:08.370
Now, the first thing, put the meters below table and Kelly Lennox and we will start now if I type,

00:08.370 --> 00:11.850
I have config inside metasploit but you can see this is the IP.

00:12.810 --> 00:14.790
That ends with 110.

00:15.360 --> 00:17.610
And here inside the Kelly.

00:19.000 --> 00:20.100
I f config.

00:20.740 --> 00:25.030
It ends with 109 OC.

00:25.060 --> 00:25.510
Cool.

00:25.780 --> 00:30.910
Now the first thing we will use and map utility and the IP address, which is one.

00:31.750 --> 00:38.940
1688110, which is 120 and ten for the Metasploit PIN machine.

00:38.950 --> 00:46.810
So if I type like this, you can see that and map simply with IP address, it will give me all of the

00:46.810 --> 00:54.820
open ports and in my case here you can see the of TB as such telnet and a lot of and a lot of ports.

00:55.180 --> 01:02.530
The same thing if I want to do for a hostname but didn't do this actually so for example Google dot

01:02.530 --> 01:04.540
com and if I press enter.

01:06.120 --> 01:12.870
So I'd map the IP and map the hostname Google dot com, Amazon.com, Cloudflare, whatever.

01:13.410 --> 01:18.630
But actually don't do this on a live target because you may get in trouble.

01:19.260 --> 01:27.330
Now of course, not just symbol and map scan, it will get you in trouble, but it's better to do that

01:27.330 --> 01:30.180
on a local machines or test machines.

01:30.210 --> 01:37.530
Now you can see google dot com has 443s and HDB open only OC.
