1 00:00:00,300 --> 00:00:06,420 OK, now it's time to talk about how to protect hosts will use the Bings can technique. 2 00:00:06,570 --> 00:00:16,590 So unmap Dash S and P is Capitán and you this time we want to provide the range or the subnet of the 3 00:00:16,590 --> 00:00:17,020 Ibbs. 4 00:00:17,070 --> 00:00:20,370 So a digital slash 24 like this. 5 00:00:20,640 --> 00:00:27,270 So as Nene's or stands for service and the service would be P which means Benke, it will send ICMP 6 00:00:27,270 --> 00:00:27,840 Becket's. 7 00:00:29,090 --> 00:00:34,370 And I it is Internet control messaging protocol, I command you to read more about it, the type of 8 00:00:34,370 --> 00:00:40,550 the packets equal like requests and all of that, just a single article will do the job. 9 00:00:40,560 --> 00:00:41,970 OK, and Bressington. 10 00:00:42,320 --> 00:00:48,410 Now, this will start scanning the whole network inside or the whole network for this. 11 00:00:49,670 --> 00:00:50,630 Specific range. 12 00:00:51,780 --> 00:00:57,280 OK, so in my case, I found four are up, as you can see, this is the first horse. 13 00:00:58,390 --> 00:01:05,320 The second horse, which is this is for the candy candy machine, also this this is for the MM. 14 00:01:05,330 --> 00:01:06,290 Profitable machine. 15 00:01:06,310 --> 00:01:07,910 This is for the candy machine. 16 00:01:08,320 --> 00:01:10,920 This is some machine on the network. 17 00:01:10,930 --> 00:01:12,010 And this is for the laptop. 18 00:01:12,070 --> 00:01:12,450 OK.