﻿1
00:00:00,240 --> 00:00:05,940
‫Throughout the course, we're going to learn how to use and map and detail to scan the networks and

2
00:00:05,940 --> 00:00:14,040
‫map network MAP is a free and open source utility for network discovery and security auditing.

3
00:00:14,640 --> 00:00:21,630
‫Many systems and network administrators also find it useful for tasks such as network inventory, managing

4
00:00:21,630 --> 00:00:28,230
‫service, upgrade schedules and monitoring host or service uptime and map runs on all major computer

5
00:00:28,230 --> 00:00:34,080
‫operating systems and official binary packages are available for Linux, Windows and Mac OS x.

6
00:00:35,030 --> 00:00:41,240
‫And MAP has been used to scan huge networks of literally hundreds of thousands of machines and MAP is

7
00:00:41,240 --> 00:00:43,130
‫usually very good at documentation.

8
00:00:43,820 --> 00:00:49,580
‫Significant effort has been put into comprehensive and up to date man pages, white papers, tutorials

9
00:00:49,580 --> 00:00:55,790
‫and even a whole book you can visit and map dot org to find out more about and map.

10
00:00:56,420 --> 00:00:58,630
‫Wilin map comes with no warranty.

11
00:00:59,180 --> 00:01:02,700
‫It is well supported by a vibrant community of developers and users.

12
00:01:03,440 --> 00:01:09,770
‫It's one of the most well-known tools of the network security domain and indeed with a lot of facilities,

13
00:01:09,770 --> 00:01:11,150
‫it's very powerful.

14
00:01:11,900 --> 00:01:18,230
‫In addition to the classic command line and map executable, the unmap suite includes an advanced GUI

15
00:01:18,230 --> 00:01:25,580
‫and results viewer Zend map, a flexible data transfer, redirection and debugging tool, and get a

16
00:01:25,610 --> 00:01:32,210
‫utility for comparing scan result and diff and a packet generation and response analysis tool.

17
00:01:32,390 --> 00:01:40,640
‫Nanping and MAP uses raw IP packets in novel ways to determine what hosts are available on the network.

18
00:01:41,770 --> 00:01:46,750
‫Which ports of these hosts are accessible, what services those hosts are offering?

19
00:01:47,690 --> 00:01:49,310
‫What operating systems are running?

20
00:01:50,480 --> 00:01:56,630
‫What type of packet filters, firewalls are in use and dozens of other characteristics.

21
00:01:57,650 --> 00:02:03,530
‫Beyond all this, and Map has its own scripting engine and allows developers to develop new modules

22
00:02:03,530 --> 00:02:07,800
‫in the following lectures to discover the network will perform the following within.

23
00:02:08,600 --> 00:02:12,350
‫First, we'll use ping scan to find out the host in the network.

24
00:02:13,040 --> 00:02:19,490
‫Then we'll use different types of port scan to find the open or accessible ports, will detect the services

25
00:02:19,490 --> 00:02:25,070
‫running on the ports and their versions will try to learn the operating systems running on the systems.

26
00:02:25,670 --> 00:02:31,580
‫And after that we'll see how to use scripts within map scans and we'll learn some important scripts

27
00:02:31,580 --> 00:02:32,060
‫as well.

28
00:02:32,510 --> 00:02:38,590
‫And MAP send some packets to discover the network to prevent security devices from blocking our packets.

29
00:02:38,900 --> 00:02:40,940
‫Here's where we're going to learn some timing tricks.

30
00:02:41,600 --> 00:02:47,100
‫Then we'll see what we can do more of to bypass security devices such as packet filters, IBS.

31
00:02:47,100 --> 00:02:47,120
‫Yes.

32
00:02:47,120 --> 00:02:50,750
‫Or IPS here there's and map command example.

33
00:02:50,750 --> 00:02:56,300
‫Let's see some basic parameters of the unmap command and map is, of course, the command itself.

34
00:02:57,350 --> 00:03:04,550
‫S is to define the scan, if you use S with uppercase T as seen in the slide, it means you want to

35
00:03:04,550 --> 00:03:06,100
‫run a TCP scan.

36
00:03:06,920 --> 00:03:09,110
‫We'll see the important scan types in detail.

37
00:03:10,090 --> 00:03:14,890
‫If you don't use this parameter and you have the administrator privileges on the computer where you're

38
00:03:14,890 --> 00:03:21,640
‫using an map, since Gannes is a default scan type, if you don't have the admin privileges on the computer,

39
00:03:22,060 --> 00:03:23,500
‫TCP scan will run.

40
00:03:24,480 --> 00:03:28,440
‫Destination IP address is the only required parameter to run this command.

41
00:03:29,440 --> 00:03:36,280
‫It means you can run the unmap command like and map one seven to dot one six nine nine one three nine.

42
00:03:37,120 --> 00:03:40,690
‫This is the IP address of the target machine, which you want to scan.

43
00:03:42,170 --> 00:03:47,810
‫You can either give a single IP address or give an IP block or an IP range as a target, but we'll see

44
00:03:47,810 --> 00:03:48,240
‫that soon.

45
00:03:49,180 --> 00:03:52,210
‫Destination ports are the port numbers that you want to scan.

46
00:03:53,270 --> 00:03:58,280
‫If the target board numbers are not given to the command, top 1000 ports will be scanned.

47
00:03:59,480 --> 00:04:06,680
‫Be careful, I didn't say the first thousand reports, I said the top one thousand reports, that means

48
00:04:06,680 --> 00:04:09,590
‫the most used thousand ports will be scanned.

49
00:04:10,560 --> 00:04:14,430
‫There are different ways to enter destination ports and we'll see them in detail.

