All language subtitles for 001 Theory Behind Scanning_en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French Download
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,750 --> 00:00:01,980 Instructor: Welcome back. 2 00:00:01,980 --> 00:00:05,790 Here we are ready to start our scanning phase. 3 00:00:05,790 --> 00:00:07,620 We have covered the information gathering 4 00:00:07,620 --> 00:00:08,700 which was first phase 5 00:00:08,700 --> 00:00:11,760 of penetration testing and now we'll proceed 6 00:00:11,760 --> 00:00:14,430 with the second stage by scanning our target 7 00:00:14,430 --> 00:00:18,030 in trying to get even more information about it. 8 00:00:18,030 --> 00:00:21,420 Now, the difference between information gathering 9 00:00:21,420 --> 00:00:24,750 and scanning is that scanning is performed 10 00:00:24,750 --> 00:00:26,823 on a much deeper level. 11 00:00:27,840 --> 00:00:31,440 And also while in the first phase we gathered all kinds 12 00:00:31,440 --> 00:00:34,500 of information such as emails, phone numbers, 13 00:00:34,500 --> 00:00:36,600 and bunch of other things. 14 00:00:36,600 --> 00:00:41,130 In the scanning, we are mainly focused on technology side, 15 00:00:41,130 --> 00:00:43,240 so we want to find out as much as we can 16 00:00:44,157 --> 00:00:45,900 about our target's Technical aspect. 17 00:00:45,900 --> 00:00:48,030 We're going to talk about in just a second 18 00:00:48,030 --> 00:00:49,980 as to what exactly are we looking 19 00:00:49,980 --> 00:00:54,300 for in this stage and what are all the goals of this stage. 20 00:00:54,300 --> 00:00:58,320 But first you could be wondering what are we going to scan. 21 00:00:58,320 --> 00:01:01,770 Since remember that scanning is something 22 00:01:01,770 --> 00:01:03,480 that we are not allowed to do 23 00:01:03,480 --> 00:01:05,613 on any target that we want. 24 00:01:06,630 --> 00:01:08,400 Don't worry, for this stage 25 00:01:08,400 --> 00:01:10,680 and any future stage from now on 26 00:01:10,680 --> 00:01:14,283 we're going to be using vulnerable virtual machines. 27 00:01:15,210 --> 00:01:17,880 There are lots of paid vulnerable virtual machines 28 00:01:17,880 --> 00:01:20,160 that you can buy and test on, 29 00:01:20,160 --> 00:01:24,540 but for this course I will be showing the free ones so all 30 00:01:24,540 --> 00:01:26,470 of us can download them, install them 31 00:01:27,797 --> 00:01:29,370 and then try to hack them. 32 00:01:29,370 --> 00:01:31,380 All of these virtual machines are going to 33 00:01:31,380 --> 00:01:34,260 be running some outdated vulnerable software 34 00:01:34,260 --> 00:01:37,170 that we will be able to exploit in the third stage 35 00:01:37,170 --> 00:01:41,130 and they will also require very little hardware power. 36 00:01:41,130 --> 00:01:43,200 So all of us will be able to run them 37 00:01:43,200 --> 00:01:46,050 while also running Cal Linux. 38 00:01:46,050 --> 00:01:47,160 And keep in mind 39 00:01:47,160 --> 00:01:50,130 that penetration testing process will look exactly 40 00:01:50,130 --> 00:01:52,110 like it will look in real world 41 00:01:52,110 --> 00:01:54,960 if you were to test some website or some network. 42 00:01:54,960 --> 00:01:57,360 The only difference is that right now. 43 00:01:57,360 --> 00:02:00,270 we know that these machines are vulnerable 44 00:02:00,270 --> 00:02:03,180 since I just told you and in real world 45 00:02:03,180 --> 00:02:06,480 you wouldn't essentially know that before testing them. 46 00:02:06,480 --> 00:02:09,720 However, just knowing they're vulnerable doesn't really 47 00:02:09,720 --> 00:02:12,610 help us as we need to figure out in what way are 48 00:02:13,525 --> 00:02:16,110 they vulnerable and how can we take advantage of that. 49 00:02:16,110 --> 00:02:18,900 Scanning will help us with this. 50 00:02:18,900 --> 00:02:23,900 We'll be using our Cal Linux machine to scan these machines 51 00:02:24,540 --> 00:02:27,427 and by scanning these machines, what they really 52 00:02:27,427 --> 00:02:29,670 mean is we're going to directly exchange packets 53 00:02:29,670 --> 00:02:33,030 with our target and once that target sends packets back 54 00:02:33,030 --> 00:02:36,660 to us, hopefully it'll discover something about the target 55 00:02:36,660 --> 00:02:38,913 machine that we will find useful. 56 00:02:39,840 --> 00:02:41,610 And what we will be sending 57 00:02:41,610 --> 00:02:45,423 to the target are TCP and UDP packets. 58 00:02:46,841 --> 00:02:49,200 TCP and UDP are just protocols that are used 59 00:02:49,200 --> 00:02:52,560 for sending bits of data, also known as packets 60 00:02:52,560 --> 00:02:55,170 and we will discuss them in a little more detail 61 00:02:55,170 --> 00:02:56,670 in the next video. 62 00:02:56,670 --> 00:03:00,360 For now, just think of them as different protocols 63 00:03:00,360 --> 00:03:04,323 that will allow us to get information from our target. 64 00:03:05,310 --> 00:03:09,450 I keep talking about information and scanning and all 65 00:03:09,450 --> 00:03:12,300 of that without actually explaining what do I mean 66 00:03:12,300 --> 00:03:14,940 by scanning and getting information? 67 00:03:14,940 --> 00:03:16,290 What are the goals of this? 68 00:03:17,256 --> 00:03:19,110 What are we looking for exactly? 69 00:03:19,110 --> 00:03:22,800 Well, we are looking for open ports 70 00:03:22,800 --> 00:03:26,130 and I don't mean USB ports or some physical ports. 71 00:03:26,130 --> 00:03:28,070 I mean we're looking 72 00:03:28,070 --> 00:03:30,600 for virtual open ports that every machine has 73 00:03:30,600 --> 00:03:33,150 and it uses them to host their software 74 00:03:33,150 --> 00:03:36,060 and communicate with other machines over internet. 75 00:03:36,060 --> 00:03:37,950 For example, you watching this 76 00:03:37,950 --> 00:03:41,100 over internet on a website means that the machine 77 00:03:41,100 --> 00:03:45,270 that's hosting this website has port 80 open. 78 00:03:45,270 --> 00:03:46,950 Why port 80? 79 00:03:46,950 --> 00:03:49,770 Well port 80 is used to host a web server 80 00:03:49,770 --> 00:03:54,770 it is used for HTP and it's also known as HTP port. 81 00:03:55,050 --> 00:03:56,970 So every time you visit a website 82 00:03:56,970 --> 00:03:58,770 you are essentially making a connection 83 00:03:58,770 --> 00:04:02,110 to that machine hosting that website on port 80 84 00:04:04,112 --> 00:04:04,950 or on port 443. 85 00:04:04,950 --> 00:04:09,100 Since port 80 is used for htp and Port 443 86 00:04:10,280 --> 00:04:15,280 is used for HTPs and HTPs is just a secure version of http. 87 00:04:16,320 --> 00:04:19,260 These are the two most usual ports that target 88 00:04:19,260 --> 00:04:21,990 that you're scanning externally will have open. 89 00:04:21,990 --> 00:04:24,990 And by externally scanning, I mean that you are scanning it 90 00:04:24,990 --> 00:04:27,813 while not being in the same network as the target. 91 00:04:28,710 --> 00:04:32,019 An example would be you scanning some website 92 00:04:32,019 --> 00:04:34,750 from your home and a port that could sometimes 93 00:04:35,702 --> 00:04:37,200 be open if you're scanning internally 94 00:04:37,200 --> 00:04:39,600 which means either scanning machines on your network 95 00:04:39,600 --> 00:04:41,910 or you're performing network penetration testing 96 00:04:41,910 --> 00:04:43,560 inside of some company. 97 00:04:43,560 --> 00:04:47,253 You could, for example, find port 21 to be open. 98 00:04:48,390 --> 00:04:52,050 This is an FTP port and it's used for file transferring. 99 00:04:52,050 --> 00:04:55,590 FTP stands for file transfer protocol. 100 00:04:55,590 --> 00:04:59,640 These is just two of the ports and there are a lot of them. 101 00:04:59,640 --> 00:05:03,090 You could, for example, have port 22 open 102 00:05:03,090 --> 00:05:06,840 which is SSH port or secure shell port. 103 00:05:06,840 --> 00:05:07,770 It is used to log 104 00:05:07,770 --> 00:05:11,490 into the target machine and execute commands on it remotely. 105 00:05:11,490 --> 00:05:15,240 We could also have, for example, port 53 open 106 00:05:15,240 --> 00:05:17,160 which is DNS port 107 00:05:17,160 --> 00:05:21,810 or we could have port 25 open, which is SMTP port. 108 00:05:21,810 --> 00:05:23,880 So there are are a lot of ports. 109 00:05:23,880 --> 00:05:28,263 Matter of fact, every machine has 65,535 ports 110 00:05:29,850 --> 00:05:34,850 for both DCP and udp, and if there is just one open port 111 00:05:35,130 --> 00:05:38,280 with one vulnerable software running on that open port 112 00:05:38,280 --> 00:05:42,450 then that target is vulnerable and it could be exploited. 113 00:05:42,450 --> 00:05:44,970 Now the highest secured machines are the ones 114 00:05:44,970 --> 00:05:47,730 that have all ports closed. 115 00:05:47,730 --> 00:05:49,800 These are usually your home devices such 116 00:05:49,800 --> 00:05:53,190 as laptops or computers that you use just 117 00:05:53,190 --> 00:05:56,790 for browsing online or playing video games or something. 118 00:05:56,790 --> 00:05:58,890 They don't need to be hosting any software 119 00:05:58,890 --> 00:06:02,187 since they're not a server that someone will connect 120 00:06:02,187 --> 00:06:03,120 to for a certain service. 121 00:06:03,120 --> 00:06:05,580 They're just home devices that you use. 122 00:06:05,580 --> 00:06:08,890 But websites, for example, must have port 80 123 00:06:09,815 --> 00:06:13,500 or port 443 open since they're hosting a webpage there. 124 00:06:13,500 --> 00:06:18,090 Also in companies, their machines could have some port open. 125 00:06:18,090 --> 00:06:21,367 Maybe they use that port on all their machines 126 00:06:21,367 --> 00:06:23,400 within that company to internally transfer files 127 00:06:23,400 --> 00:06:24,930 between different machines. 128 00:06:24,930 --> 00:06:26,460 It could be anything basically. 129 00:06:26,460 --> 00:06:29,820 Now the problem occurs if that software they use 130 00:06:29,820 --> 00:06:34,500 on their open ports is outdated and has a vulnerability 131 00:06:34,500 --> 00:06:38,280 then our job as a hacker is to scan that machine 132 00:06:38,280 --> 00:06:41,400 for open ports and exploit that machine 133 00:06:41,400 --> 00:06:45,090 through that vulnerable software running on that open port. 134 00:06:45,090 --> 00:06:46,920 But the goal for now 135 00:06:46,920 --> 00:06:50,280 in the scanning section is only to scan the target 136 00:06:50,280 --> 00:06:51,780 for the open ports. 137 00:06:51,780 --> 00:06:55,080 Then we want to discover what software are they running 138 00:06:55,080 --> 00:06:56,790 on those open ports. 139 00:06:56,790 --> 00:07:00,360 And we want to go as deep as discovering what version 140 00:07:00,360 --> 00:07:03,540 of software is on that open port. 141 00:07:03,540 --> 00:07:04,800 Are you ready? 142 00:07:04,800 --> 00:07:07,620 We're going to be covering a lot in this section. 143 00:07:07,620 --> 00:07:09,780 And in this section we will cover one 144 00:07:09,780 --> 00:07:13,710 of the most important tools that a hacker must master. 145 00:07:13,710 --> 00:07:15,783 That tool is called and enmap. 146 00:07:16,800 --> 00:07:18,063 Let's dive into scanning. 11822

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.