1 00:00:08,140 --> 00:00:13,040 Let us continue with scanning and numeration take part in this lecture. 2 00:00:13,480 --> 00:00:19,030 We are going to learn an overview of MAP and we will also get to know why we use and map. 3 00:00:20,680 --> 00:00:26,440 And map, there is network map, there is an open source and free security scanner used for network 4 00:00:26,440 --> 00:00:33,490 discovery and security auditing during a scan and map sent specially crafted packets to the target host 5 00:00:33,850 --> 00:00:35,710 and then analyzes the responses. 6 00:00:36,250 --> 00:00:43,200 It is capable of host discovery port scanning service name and was in detection or detection. 7 00:00:43,900 --> 00:00:52,480 The typical use of a map includes security audits of a firewall and also open port ID network security 8 00:00:52,480 --> 00:00:59,890 audit, network mapping, network inventory, asset management, vulnerability detection and exploitation. 9 00:01:00,430 --> 00:01:02,500 Host and service uptime. 10 00:01:02,500 --> 00:01:09,970 Monitoring and map is famous as Swiss Knife of the Network Discovery and Security Auditing Process and 11 00:01:09,970 --> 00:01:17,560 map users raw IP packets in a novel way to determine what hosts are available on the network and what 12 00:01:17,560 --> 00:01:19,870 services like Application Name and Wazzan. 13 00:01:20,320 --> 00:01:23,740 Those hosts are offering what operating system there is. 14 00:01:23,740 --> 00:01:29,800 The authorities are running on the system, what type of packet filters, firewalls are in use and dozens 15 00:01:29,800 --> 00:01:31,090 of other characteristics. 16 00:01:31,600 --> 00:01:36,820 It was designed to rapidly scan large networks but works fine against single hosts. 17 00:01:37,480 --> 00:01:41,140 And MAP is available for Linux, Windows as well as Mako's. 18 00:01:41,710 --> 00:01:45,220 In addition, classic command line and map executable. 19 00:01:45,370 --> 00:01:49,690 That and map includes an advance Dewa Collard's and Map. 20 00:01:50,290 --> 00:01:58,240 Then MAP has all the flexible and graphical oriented features and MAP was named Security Part of the 21 00:01:58,240 --> 00:02:04,090 year by the National Info World in Executions Dot org and Code Talker Digest. 22 00:02:04,600 --> 00:02:11,620 It was even featured in full movies including The Matrix Reloaded, Diatta for The Girl with the Dragon 23 00:02:11,620 --> 00:02:15,790 Tattoo and The Bourne Ultimatum and Map owns. 24 00:02:15,790 --> 00:02:21,520 It's a unique scripting engine which handles all the vulnerability and exploitation scan's popularly 25 00:02:21,520 --> 00:02:24,160 known as NMC and Map Scripting. 26 00:02:24,160 --> 00:02:29,770 Engine One can write their own custom scripts and run that script against the Target host. 27 00:02:30,430 --> 00:02:33,280 There is an official book authored by some founder of MAP. 28 00:02:33,610 --> 00:02:39,820 It explains various topics like how to use and effectively how port scanning is being done, how to 29 00:02:39,820 --> 00:02:44,530 create custom VCP IP packets at network level for advanced port scanning and so on. 30 00:02:45,580 --> 00:02:52,330 Let us discuss the cheat sheet of some important moments and let us start with the first camera and 31 00:02:52,330 --> 00:02:59,100 map that it displays how to use the map tool, as well as the syntax of all the commands. 32 00:02:59,560 --> 00:03:05,890 The next three commands in that first and map one ninety two point one sixty eight point one point one 33 00:03:06,040 --> 00:03:14,590 scans a single IP next command scans multiple APIs and the next command and map one ninety two point 34 00:03:14,600 --> 00:03:23,020 one sixty eight point one point one dash 254 scans range of IPIS in the next command scan. 35 00:03:23,020 --> 00:03:30,640 Meader and OAG is the domain name and map can also be used to scan the domains and map. 36 00:03:30,790 --> 00:03:35,140 That show is used for always fingerprinting and map. 37 00:03:35,350 --> 00:03:42,070 Dashi gives you everything about that IP address like the board switchboards are open which operating 38 00:03:42,070 --> 00:03:45,210 system that system is using and all the information. 39 00:03:46,000 --> 00:03:51,160 Next is the AMAP 081 data P forty five. 40 00:03:52,120 --> 00:04:00,670 E0 is used for intrusion detection, system evasion that Stephen is used for more aggressively evading 41 00:04:00,670 --> 00:04:07,210 the intrusion detection system BASTIDA it slows down the scan to use less bandwidth and use less targeted 42 00:04:07,240 --> 00:04:08,140 machine resources. 43 00:04:08,560 --> 00:04:15,060 Destry is the normal speed dashty for aggressively scans targeting network. 44 00:04:15,310 --> 00:04:18,520 It assumes that you are unreasonably fast and reliable. 45 00:04:18,520 --> 00:04:22,420 Network Dashty five is the insane speed scan. 46 00:04:23,080 --> 00:04:27,430 It assumes that you are on an extraordinarily fast network. 47 00:04:27,880 --> 00:04:30,190 Next one and Duceppe. 48 00:04:30,580 --> 00:04:34,260 Sometimes a single large packet is blocked by a firewall. 49 00:04:34,630 --> 00:04:41,140 Therefore, by applying Duceppe, a single large packet is broken down the smaller packets the next 50 00:04:41,350 --> 00:04:50,050 and map dash as w w w that Microsoft dot com space www.youtube.com it is. 51 00:04:50,530 --> 00:04:58,930 It scans Facebook dot com from Microsoft dot com therefore hides our real IP address and the last and 52 00:04:58,930 --> 00:05:04,030 map dashboard and it saves the scan results in a normal text file. 53 00:05:05,190 --> 00:05:11,640 We are going to execute all these commands in our practical lectures in the next lecture, we'll start 54 00:05:11,640 --> 00:05:13,290 with the practicals on scanning.