TryHackMe | Nmap Basic Port Scans | Walkthrough

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hey guys welcome to my channel hope you guys liked the last video uh what was it okay so we're in comp TI pentest learning path and we're at the information gathering and vulnerability scanning the last video was map Live host Discovery and this one today we're gonna do nmap basic Port scans or reset it it says learn in depth how nmap TCP connect scan TCP Sy port scan and UTP port scan work all right let's get right into it uh I'm going to start the machine here on task 4 just to get ourselves ahead uh let me see ex all right guys let's go to task one introduction as you know these videos I'm just showing how to answer the questions per each task I strongly recommend to read through each task to get a full understanding what's all about you know cyber security is a vast feel um yeah um let's get right into it test one introduction so it says this room is the second in the MF Series so live host Discovery basic port scan Advanced port scan Post Port scans and it says answer questions below launch attack Box by using start attack box button you will launch different types of scans against the target VM to gain a solid knowledge of map basic scan types so complete all right and let's go task two TCP and UDP ports as for myself I always remember TCP means secure UDP means unsecure so and answer the questions below which service uses UDP Port 53 by default and there's a hint that says require external research so what that mean is use Google so and as the first answer pops up the answer is DNS okay makes sense because pit3 is is a Ser report so uh okay next question which service uses TCP Port 22 by default hint requires external research so you are familiar with the ports 22 is already secure so I I assume is SSH but the hint says require external research so you can just highlight and Google again and there you go SSH so secure shell host and next question is how many Port states does nmap consider okay uh as you read through the task it says import consider the following Six States One open close filter unfilter open filter close filter so and last question which which part state is the most interesting to discover as a pen tester so furthermore tsp open so just open and close right so thenine blah blah blah examples this thing specific for open it's probably most interesting because it's open closes you know it's closed so yeah all right task three TCP flags all right talks about TCP header uh you can read through all this and it just talks about signaling for the TCP so answer questions below what three letters represent reset flag this one's pretty easy rst says reset flag to reset connection so you are G's urgent a acknowledge PC H is pushing flag RSC is reset sin is synchronized and Finn is finish yeah last question which flag needs to be set when you initiate a TCP connection first packet of the of TCP 3we handshake so the first one I believe is acknowledge right no is it sin it oh yeah right here the shape can see that so synchronize a flag is used to initiate DCP all right task four TCP connect scan all right talks about the the three handshake Sin Sin acknowledge knowledge and then the MST send send ackowledge reset ackowledge okay so just talks about [Music] connection and it says answer your questions below launch the VM let's show split okay open the T box and execute n map slst so I want to close this 10.10.5 n136 paste oops that's not it copy paste the clipboard open the terminal and paste it says open via terminal a new service has been installed this VM since our last scan which port number was closed in the scan above but it's now open on the target VM okay so you could just comparing it looks like this is new pop three because there's no pop three on the left so Port numberers one 10 and last question is what is end map's guess about the newly installed service so it's pop three all right let's go task five TCP sin scan so remember guys you got to terminate task 4 then you got to start P five so didn't work with the scan so all right so this talks about TCB sin scan and it says answer questions launch of VM some new server software has been installed since the last time we scan it on the ATT box use the terminal to execute so we're waiting for this what is the new open port so it's still loading I'm G close this out so these should be easy videos um I believe I did this one already these three already and as you can see guys I'm I used to not how complete this but I guess uh they got they updated it so I got to redo all this uh all right five more seconds all right so let's copy and paste M m- ss110 34216 all right all right what's the new P open port so we compare again looks like like this one's new the r IRC and what's the port number it says 6667 and what is the m guest of the server name IRC all right let's go test 6 UTP scan again terminate the old one start the Tas 61 so you get another new IP address so talks about UTP scan so connectionless protocol I always remember it's kind of unse unsecure so answer questions below launch a VM on the attack box use the termine with execute m-su D f-v waiting on the IP address a new server has been installed since the last scan with UTB Port that is now open hint UTP port scan takes longer than TC TCP Port scans the- F flag was add to the scan scan 100 most common instead of thousand we also added DV to get updates as the scan progresses I see okay should be popping up pretty soon yeah okay so let's copy this clear all right all right it's scanning so it's going to take a while six 7 all right so while doing that okay I just want to show you guys uh I currently not in the IT industry but I am transitioning this is something I really like doing uh that's why I have a subscription based to try hat me.com and I utilize my own time and my money no reimbursement uh to get comp TI certified because it's recognized uh where I work currently if I want to transition as you can see I am uh I did a video on how to pass CTI a plus Security Plus and pendes plus um I haven't done Network Plus or cyssa plus u it's pretty much the same format how I passed the test and I did if for fundamentals because I I don't know it was cheap and I have time to do it and I think I was getting uh uh brain fry fry my brain I don't know I was getting brain Deb yeah stunning all these tesas so let's see still all right okay looks like it's done new service so 68 and there's 111 so new one is this one 53 UDP what's the service name according to mmap domain all right cool all right Tas seven find tuning scope and performance so it talks about specific finding ports so these are commands you can read through all of it so answer questions below what is the option to scan all the TCP ports between 5,000 and 5500 here construct your answer using the option- P to specify the port range all right Port range so all right so I believe all right here Port range do p12 P1 two three scam ports between one and one two okay so what is the scam option so I'm going to copy and paste P will be 5,000 5500 all right so uh that was very easy of course and to put M map m m-p 5000-5500 so next question how can you ensure that mount will run at least 64 probes in parallel H you have to specify the option SL minimum paral parallelism followed by equal to set the right value so minimum right so Ure at least as you read right here so right here for instance D- parallelism equal 5112 pushes and maintain at least 512 probes in parallel so you can copy and paste 64 right so 512 that was easy okay last question what option would you add to make M very slow and paranoid all right slow and paranoid as you redo test you to avoid IDs alerts you might consider dt0 dt1 t0 scan one point a time wait five minutes between sending each probe so you can guess how long scanning one target will take to finish so the slowest would be t z yeah and then task eight summary just talks about cover summarize of three types of scans and then discovered the running type nice all the option tells you all the purpose and answer your questions below it says ensure you have taken note of all the scan options covered in this room is is time to learn more advanced support scanning techniques by joining the end map Advanced port scan room so let's have I done this yes I have all right click complete and you can share on Twitter Facebook on LinkedIn I already share on LinkedIn you like this video guys please give a thumbs up hit the Subscribe button hit the notification button com comment on my video so I can prove these better and since this is done I'm going to reset the next room for it all right so I believe this is going to be the last video sorry guys loading on information gathering and vulnerab scanning after the inmat Advance Port scans is attack and exploit so anyways thanks for watching guys till next time h
Info
Channel: PLei
Views: 146
Rating: undefined out of 5
Keywords: Pentest, TryHackMe
Id: tu9cNWz7w-w
Channel Id: undefined
Length: 16min 59sec (1019 seconds)
Published: Fri Dec 08 2023
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.