1 00:00:01,040 --> 00:00:02,210 Now, what is about? 2 00:00:03,280 --> 00:00:08,080 The board is a virtual location where networking communication starts and ends in a nutshell. 3 00:00:08,920 --> 00:00:14,210 OK, so for more in-depth explanation, we need to establish a little background information. 4 00:00:14,560 --> 00:00:17,860 There are two kinds of network, both on each computer. 5 00:00:17,890 --> 00:00:26,770 Sixty five thousand five hundred thirty six, each of each for a total of one hundred thirty one thousand 6 00:00:26,770 --> 00:00:28,990 and eighty two network bots. 7 00:00:29,710 --> 00:00:33,250 And this is considered as TCP and UDP. 8 00:00:33,580 --> 00:00:33,960 OK. 9 00:00:35,150 --> 00:00:41,150 Now, each computer has an Internet protocol, the IP address, which is how the network knows which 10 00:00:41,150 --> 00:00:42,500 computer to send package to. 11 00:00:43,040 --> 00:00:50,480 So if you send a bucket to the IP address, the computer knows what to the do to based on application 12 00:00:50,480 --> 00:00:56,870 or packet contains a service running on the computer needs to listen on a designated board. 13 00:00:57,970 --> 00:01:06,640 So the first 1023 ECB boards are the wellknown boards reserved for applications like FTB, the twenty 14 00:01:06,640 --> 00:01:10,000 one FGB eighty, or as such, the 22. 15 00:01:10,920 --> 00:01:17,700 And the Internet assigned numbers authority, the Ianna, reserves these points to keep them standardised, 16 00:01:18,330 --> 00:01:26,490 ECB reports from one thousand twenty four to forty nine thousand and one hundred fifty one are available 17 00:01:26,490 --> 00:01:31,050 for use by services or applications and you can register them with. 18 00:01:31,050 --> 00:01:38,940 And so they are considered Cime Reserve Board's forty nine thousand one hundred fifty two and here are 19 00:01:38,940 --> 00:01:39,570 free to use. 20 00:01:39,900 --> 00:01:47,070 Now let's start with board scanning basics about scanners DCB or UDP network packet and ask the board 21 00:01:47,070 --> 00:01:48,450 about their current status. 22 00:01:48,840 --> 00:01:54,780 The three types of responses are below, which is open or accepted the computer response and ask if 23 00:01:54,780 --> 00:01:57,240 there are anything it can do for you. 24 00:01:57,870 --> 00:02:03,630 Closed or not listening, the computer responds that this is currently in use and and available at this 25 00:02:03,630 --> 00:02:06,180 time or filter drop blocked. 26 00:02:06,570 --> 00:02:08,670 The computer doesn't even bother to respond. 27 00:02:08,940 --> 00:02:16,150 So we either have a respond or without respond or we have a response that the board is going in use. 28 00:02:16,320 --> 00:02:16,740 OK. 29 00:02:18,330 --> 00:02:25,410 Now, let's start with scanning techniques now, by the way, this is just a general idea about the 30 00:02:25,410 --> 00:02:32,340 scanning techniques we would have in depth, about the unmap scanning techniques, Nori's and in theory 31 00:02:32,550 --> 00:02:35,190 way OK, and we would have the hands on later on. 32 00:02:35,440 --> 00:02:36,600 First, the big scan. 33 00:02:36,870 --> 00:02:43,530 This is the simplest scan Abbink scan looks for any ICMP reply's indicate if a target is alive. 34 00:02:44,280 --> 00:02:53,010 DCB have opened a fast and common scan that request and it is Sikhi or ekh or acknowledge it from a 35 00:02:53,010 --> 00:02:58,650 computer also called ACIN, which means a synchronization or synchronized scan. 36 00:02:58,830 --> 00:02:59,280 OK. 37 00:03:00,430 --> 00:03:06,990 This is similar to the TCBY have a brain scan, but the TCB connects can complete the DCB connection. 38 00:03:08,280 --> 00:03:15,750 YouTube, which is a slower than DCB scan and UDD scan, works best when you send a specific payload 39 00:03:15,750 --> 00:03:22,470 to Target, such as the NASA request, and we have the stealth scanning quite and and obvious stealth 40 00:03:22,470 --> 00:03:25,230 scanning is commonly used by hackers for this reason. 41 00:03:26,500 --> 00:03:32,890 Now, what are the difference between DCB and Goodbee now we learn that we have Canet UDP stealth scanning 42 00:03:32,890 --> 00:03:35,170 is to be half open in Cincinnati. 43 00:03:35,200 --> 00:03:35,800 What is that? 44 00:03:36,250 --> 00:03:37,710 We will talk about it right away. 45 00:03:37,990 --> 00:03:43,990 TCBY and YouTube are the two most common protocols used for the EBE networks on the Internet protocol 46 00:03:43,990 --> 00:03:44,440 networks. 47 00:03:45,490 --> 00:03:51,190 ECB automatic transmission control protocol is a nice, orderly transaction protocol. 48 00:03:52,180 --> 00:03:58,120 DCB cents each bucket in order, complete with chicken vitrification and the three way handshake to 49 00:03:58,120 --> 00:04:02,640 confirm each bucket is successful, which is the Cincinnati and EC. 50 00:04:03,250 --> 00:04:07,180 Now I'm assuming that you have a simple idea of how this works. 51 00:04:07,390 --> 00:04:08,680 OK, so I will move on. 52 00:04:10,870 --> 00:04:14,400 Now, used to be doesn't have any chicken, but tends to be faster. 53 00:04:15,250 --> 00:04:19,250 And live stream streaming and online video games often use YouTube. 54 00:04:19,270 --> 00:04:23,290 For this reason, because it's faster, YouTube is a connection, less protocol. 55 00:04:23,410 --> 00:04:26,250 So programs that use YouTube just send the data. 56 00:04:26,380 --> 00:04:31,000 And if you miss it, you will never get it again because it is a connection. 57 00:04:31,240 --> 00:04:35,500 There are no three way handshaking, as we learned from here, the Cincinnati Act. 58 00:04:35,530 --> 00:04:38,840 OK, so that's why it is faster and connections. 59 00:04:39,220 --> 00:04:43,330 Now, again, I'm assuming that you are familiar or have a simple idea. 60 00:04:43,780 --> 00:04:47,110 What is the TCBY, what this would be and how this works? 61 00:04:47,200 --> 00:04:47,680 OK. 62 00:04:47,770 --> 00:04:48,940 In a nutshell, that's it. 63 00:04:49,720 --> 00:04:54,340 So if you are not these, you can just Google it and how you works. 64 00:04:54,460 --> 00:04:56,820 Just read the simple article. 65 00:04:56,850 --> 00:04:57,650 It's no big deal. 66 00:04:58,060 --> 00:05:06,040 What we need to hear is you need to have a just a simple idea how GCB works, the three three way checking 67 00:05:06,040 --> 00:05:12,670 verification, checking that connection, this and the difference between D.V. and you to be just as 68 00:05:12,670 --> 00:05:17,890 simple as that just type difference or TCP versus UTB and the simple article. 69 00:05:17,890 --> 00:05:19,050 And you will be by.