All language subtitles for 3. Gathering Sensitive Info About Connected Devices (Device Name, Ports....etc)

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 1 00:00:00,940 --> 00:00:02,710 The second program that we'll use 2 2 00:00:02,710 --> 00:00:05,990 for network mapping is Nmap. 3 3 00:00:05,990 --> 00:00:08,740 Now in the previous lecture we used netdiscover 4 4 00:00:08,740 --> 00:00:11,860 and we seen how nice it is to quickly discover 5 5 00:00:11,860 --> 00:00:14,300 all the devices connected to our network, 6 6 00:00:14,300 --> 00:00:17,610 see their MAC address and maybe get the vendor. 7 7 00:00:17,610 --> 00:00:21,150 Nmap takes scanning to a whole new level. 8 8 00:00:21,150 --> 00:00:23,960 It might be a little bit slower than netdiscover 9 9 00:00:23,960 --> 00:00:27,450 but it will show you much much more information 10 10 00:00:27,450 --> 00:00:28,730 about the target. 11 11 00:00:28,730 --> 00:00:31,090 So you'll be able to see the open ports, 12 12 00:00:31,090 --> 00:00:33,510 you'll be able to see the running programs 13 13 00:00:33,510 --> 00:00:36,160 or the running services on these open ports. 14 14 00:00:36,160 --> 00:00:39,400 You'll be able to determine the computer name, 15 15 00:00:39,400 --> 00:00:42,660 the operating system running on that computer. 16 16 00:00:42,660 --> 00:00:45,270 If you are in a network, you'll be able to discover 17 17 00:00:45,270 --> 00:00:47,380 all of the connected clients. 18 18 00:00:47,380 --> 00:00:51,070 You'll be able to bypass security, bypass firewalls 19 19 00:00:51,070 --> 00:00:52,483 and so much more. 20 20 00:00:53,600 --> 00:00:56,220 Nmap is actually a huge tool and there are books 21 21 00:00:56,220 --> 00:00:59,750 and complete courses done just to teach Nmap. 22 22 00:00:59,750 --> 00:01:02,490 The Nmap book would actually be a really good read 23 23 00:01:02,490 --> 00:01:04,920 once you're done with this course. 24 24 00:01:04,920 --> 00:01:07,700 Now because this tool is huge, we're not gonna be able 25 25 00:01:07,700 --> 00:01:10,710 to cover of all its uses but in this lecture, 26 26 00:01:10,710 --> 00:01:13,070 I'm gonna show you the basics of this tool, 27 27 00:01:13,070 --> 00:01:15,970 how to use it to discover all the connected clients 28 28 00:01:15,970 --> 00:01:18,700 and see useful information about them. 29 29 00:01:18,700 --> 00:01:21,300 And we'll actually use it more when we get 30 30 00:01:21,300 --> 00:01:23,423 to the gaining access section. 31 31 00:01:25,100 --> 00:01:27,160 We're actually going to be using Zenmap 32 32 00:01:27,160 --> 00:01:30,493 which is the graphical user interface of Nmap. 33 33 00:01:31,350 --> 00:01:34,490 So to run it in Terminal you just have to type Zenmap 34 34 00:01:35,480 --> 00:01:38,483 or you can find it under your Applications menu. 35 35 00:01:39,410 --> 00:01:43,040 Now as you can see, it has a very very simple interface. 36 36 00:01:43,040 --> 00:01:46,650 The first thing that we see is the target input box, 37 37 00:01:46,650 --> 00:01:48,940 in here you can put your target. 38 38 00:01:48,940 --> 00:01:51,730 You can scan any IP that you can reach, 39 39 00:01:51,730 --> 00:01:55,150 whether it's a personal computer, whether it's a server, 40 40 00:01:55,150 --> 00:01:58,300 whether it's an IP for a web-server for a website, 41 41 00:01:58,300 --> 00:02:01,190 for example, that you want to discover all the open ports 42 42 00:02:01,190 --> 00:02:03,730 and all the running services on it. 43 43 00:02:03,730 --> 00:02:06,070 Or, like what we're going to do right now, 44 44 00:02:06,070 --> 00:02:10,060 we can put a range similar to what we did with netdiscover 45 45 00:02:10,060 --> 00:02:14,270 and it will scan this whole range, discover all the live IPs 46 46 00:02:15,339 --> 00:02:18,200 of the connected machines on the same network 47 47 00:02:18,200 --> 00:02:20,703 and display information about them. 48 48 00:02:21,760 --> 00:02:24,860 Now we'll have a look on how to scan servers 49 49 00:02:24,860 --> 00:02:26,660 in the gaining access section. 50 50 00:02:26,660 --> 00:02:28,480 So for now, since we are still 51 51 00:02:28,480 --> 00:02:30,800 in the network hacking section 52 52 00:02:30,800 --> 00:02:33,740 we're gonna put a range to discover all the connected 53 53 00:02:33,740 --> 00:02:37,023 clients and see useful information about them. 54 54 00:02:37,910 --> 00:02:41,330 So, right now I'm actually connected to my wireless network, 55 55 00:02:41,330 --> 00:02:44,630 that's why I'm gonna specify the whole range on that network 56 56 00:02:44,630 --> 00:02:47,470 and we seen how to get that in the previous lecture. 57 57 00:02:47,470 --> 00:02:51,400 So it's 192.168.11 58 58 00:02:51,400 --> 00:02:52,913 over 24. 59 59 00:02:54,545 --> 00:02:56,930 At the bottom you can see the command, 60 60 00:02:56,930 --> 00:03:00,610 this is actually the Nmap command that will be executed 61 61 00:03:00,610 --> 00:03:02,700 when I hit the Scan button. 62 62 00:03:02,700 --> 00:03:05,140 So like I said, Zenmap, what we're using right now 63 63 00:03:05,140 --> 00:03:07,730 is just a graphical interface 64 64 00:03:07,730 --> 00:03:10,460 that will run this Nmap command in the background 65 65 00:03:10,460 --> 00:03:12,020 and show me the results. 66 66 00:03:12,020 --> 00:03:15,420 So, if you know a custom Nmap command you can put it here 67 67 00:03:15,420 --> 00:03:17,940 or if you just want to see Nmap in Terminal 68 68 00:03:17,940 --> 00:03:21,240 you can literally copy this command, paste it in Terminal 69 69 00:03:21,240 --> 00:03:24,000 and it will give you the same results that you would get 70 70 00:03:24,000 --> 00:03:25,243 if you run it here. 71 71 00:03:26,460 --> 00:03:29,540 Alternatively, if you don't really know much about Nmap 72 72 00:03:29,540 --> 00:03:31,290 and it's commands, you can use 73 73 00:03:31,290 --> 00:03:33,343 one of the ready profiles in here. 74 74 00:03:35,340 --> 00:03:37,780 So in this lecture we're actually gonna be using 75 75 00:03:37,780 --> 00:03:40,700 a number of these profiles and we'll see the difference 76 76 00:03:40,700 --> 00:03:42,800 between them, in terms of speed 77 77 00:03:42,800 --> 00:03:44,433 and the information gathered. 78 78 00:03:46,100 --> 00:03:48,930 So I'm gonna start with the Pink scan. 79 79 00:03:48,930 --> 00:03:51,920 This is a very quick scan, it literally just pings 80 80 00:03:51,920 --> 00:03:55,780 every possible IP in the range, and if it gets a response, 81 81 00:03:55,780 --> 00:03:58,310 it will record this response and it will show me 82 82 00:03:58,310 --> 00:04:00,450 the devices that devices that gave me a response 83 83 00:04:00,450 --> 00:04:02,250 which means that these are the devices 84 84 00:04:02,250 --> 00:04:04,220 connected to the network. 85 85 00:04:04,220 --> 00:04:07,780 Now a lot of devices do not respond to pinged requests 86 86 00:04:07,780 --> 00:04:11,240 even if they are alive, so the list that you'll get 87 87 00:04:11,240 --> 00:04:14,620 in the scan might not include all the devices 88 88 00:04:14,620 --> 00:04:16,163 connected to your network. 89 89 00:04:17,170 --> 00:04:19,960 Now once the scan's done, as you can see, we can see 90 90 00:04:19,960 --> 00:04:22,940 the list of all the connected devices in here. 91 91 00:04:22,940 --> 00:04:25,740 And in here we can also see the MAC addresses 92 92 00:04:25,740 --> 00:04:28,120 for each of these devices. 93 93 00:04:28,120 --> 00:04:31,140 We also can see the vendor, so for example, we can see 94 94 00:04:31,140 --> 00:04:35,710 that the device at 192.168.11 is a Cisco device, 95 95 00:04:35,710 --> 00:04:37,610 this actually my router 96 96 00:04:37,610 --> 00:04:40,470 and it is made by Cisco so this is correct. 97 97 00:04:40,470 --> 00:04:42,960 So we can go ahead and start looking for exploits 98 98 00:04:42,960 --> 00:04:44,053 in this device. 99 99 00:04:45,490 --> 00:04:49,900 We can also see the 192.168.10 is a HTC device 100 100 00:04:49,900 --> 00:04:53,400 and again, this is a HTC phone, this is correct. 101 101 00:04:53,400 --> 00:04:56,820 And since it's HTC then we know that it's probably 102 102 00:04:56,820 --> 00:04:58,490 running on Android. 103 103 00:04:58,490 --> 00:05:00,650 So as you can see, we're getting more information 104 104 00:05:00,650 --> 00:05:02,770 about the connected clients. 105 105 00:05:02,770 --> 00:05:07,770 Again, we can see the 192.168.12 is an Apple device, 106 106 00:05:07,770 --> 00:05:10,543 so it could be a phone, a tablet or a Mac. 107 107 00:05:11,410 --> 00:05:14,340 We can see the next device is a Dell. 108 108 00:05:14,340 --> 00:05:17,490 So again, it was a very quick scan but as you can see 109 109 00:05:17,490 --> 00:05:19,800 it still gave us much more information 110 110 00:05:19,800 --> 00:05:22,473 than what we got from netdiscover. 111 111 00:05:23,610 --> 00:05:26,310 The next scan that I wanna show you is the Quick scan. 112 112 00:05:27,520 --> 00:05:30,560 Now this is gonna be slightly slower than the Pink Scan 113 113 00:05:30,560 --> 00:05:32,893 but it's gonna show us more information. 114 114 00:05:34,900 --> 00:05:37,900 So right now, you can see that the scan is showing us 115 115 00:05:37,900 --> 00:05:41,530 the same information that we seen before with the Pink scan 116 116 00:05:41,530 --> 00:05:45,450 but it's also showing us the open ports on each one 117 117 00:05:45,450 --> 00:05:47,800 of the discovered devices. 118 118 00:05:47,800 --> 00:05:50,190 So it's able to discover the following ports 119 119 00:05:50,190 --> 00:05:53,500 in the router and we can see that port 80 is open. 120 120 00:05:53,500 --> 00:05:56,600 This is actually the port used for the router settings 121 121 00:05:56,600 --> 00:05:59,763 page because it runs on a webserver, so this is correct. 122 122 00:06:01,140 --> 00:06:03,660 Again we have our Apple device here that we said 123 123 00:06:03,660 --> 00:06:06,740 it might a phone or a computer or a tablet, 124 124 00:06:06,740 --> 00:06:09,080 but we can see now it has port 22 open. 125 125 00:06:09,080 --> 00:06:12,340 So this is a port for a service called SSH 126 126 00:06:12,340 --> 00:06:14,880 which is designed to allow remote access 127 127 00:06:14,880 --> 00:06:16,723 to the system it's running on. 128 128 00:06:17,760 --> 00:06:20,170 Again, if you go on all the other devices 129 129 00:06:20,170 --> 00:06:23,860 you can see all the open ports and the services running 130 130 00:06:23,860 --> 00:06:25,553 on each one of these ports. 131 131 00:06:27,290 --> 00:06:30,090 Now, in the next lecture, we'll build up on this. 132 132 00:06:30,090 --> 00:06:33,110 We'll see how to gather even more information 133 133 00:06:33,110 --> 00:06:36,750 and you'll see how important information gathering is 134 134 00:06:36,750 --> 00:06:40,180 because we're going to use the gathered information 135 135 00:06:40,180 --> 00:06:43,670 to hack into an iPhone that is connected 136 136 00:06:43,670 --> 00:06:44,963 to the same network. 12268

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.