TryHackMe | Nmap Live Host Discovery | Walkthrough

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hey guys welcome to my channel hope you guys like the last video uh I uploaded passive and active reconnaissance so we're still in the comp Tia pentest learning path I reseted uh the end map Live host Discovery so it's loading right now so this one is learn how to use nmap to discover Live host using ARP scan icmp scan and tcp/udp ping scan so uh yeah let's get right into it as you know guys um these videos I'm going to show you how to answer questions for each test I strongly recommend to read through each test to get a full understanding what's uh these uh room all about so all right let's go t CL one introduction all right so it talks about end Maps R ARP scan Mass scans and these levels one through nine so it says answer questions below some of these questions will require use of static site to answer to askas questions While others require the use of attack box and the target VM so now the answer needed just correct answer all right my attack box loaded you can use your own Linux machine but I always I like attack boxes so it comes with it all right t two sub networks all right again there's a click view site so let me see if I can zoom in all right so has example it talks about Network and subnet next and uh it says answer questions below send a packet with the following so let's let's follow the steps so computer one computer one are ARP request computer 6 so let's uh ARP requests okay that should be good all right computer six send packet Okay click again all right and the question is how many device can see the ARP requests hint do not count the switch when counting device so as you can see not the router just three right three computers or let see switch okay or count the RS four all right and the next question did computer 6 receive the ARP request here sir no so you click again no doesn't computer six right here so no did computer six reply I guess yeah because we're asking computer 6 using Okay ARP requests oh oops wrong there you go oops so this this one's a different one sorry about that so let's go computer 4 a request computer 6 s packet all right how many devices can see the ARP requests hint do not count switch when counting device so I think it's four again and the computer six reply to RP request yes or no this one yes right here okay that was easy all right let's go task three enumerating targets so answer questions below what's the first IP address nmap with scan you provided 10101 12329 as your target hint and it says run MMA slsl n10 do 10.12.13 29 so let's go to attack box so this one's we're using mmap techniques right so clipboard paste let's go to the terminal box and right click paste there you go and it says what's the first IP address and the first one is 10.1.1 12.8 all right and some IP addresses will map scan you provide the following range 10.1.0 225 25511 sl125 hint run map same thing clipboard pace and the last one is map done 6,400 IP address so all right again these are different techniques to find Targets and yeah task four discovering live hosts sorry so this one talks about TCP and UTB so answer questions below send pack send a packet from following so let's go back to this again computer one to computer 3 ping requests so and it says what is the type of packet that computer sent before the the [Music] pain all right let's see this will be has many types Echo you want same subnet should be icmp see although TCP and UTV transport layers A Scanner TCP all right this will be TCP it's arp sorry oops cuz that's the first one right here and the next question what is the type of packet computer want to receive before being able to send to Ping so I believe it's ARP response yeah it's second one and how many computers responded to the pay request so let's do again see is it one yes it is all right let's change sand packet of the with the following computer 2 to computer five ping request what is the name of the first device that responded first r ARP requests okay so we scroll down see is a routing oops no it's not let's try again oops computer oops might be I believe computer five or two NOP switch to switch one router okay right so first device router switch to computer 5 what's the name the first device respond to the second ARP well could be either switch 2 or computer five yeah so switches doesn't count as the voice send an request does it require new ARP request yes or no no because once you sent it's just same thing yeah all right task five n map host discover using ARP so we're using ARP talks about receiving and requesting reply all right let's see it says answer your questions below we be using this again from from computer one to computer one type ARP requests data try all possible eight devices in the network all right let's go to comp to so I believe this four no let see try other than see can let's try computer five three so it's three computers all right test six and map host Discovery using icmp so using icmp talk about pinging and answer questions below what is the option required to tell M to use I see MP timestamp to discover Life hopes so what I do is I'll type time stamp so as you can see this says right here this command SL PP time St next question was the option required to tell M map to use IC icmp address mask to discover live hostes again let's I'll type M so enable so M use Mass queries so it looks like PM yeah and last question is what is the option required to tell MMA to use ICM P Echo to discover Life host so let's try looks like to use Echo request discover Li host option Das PE okay very cool and let's go to test seven and map host Discovery using TCP and UDP so I always remember TCP is secure and UTP is not so talks about TCP syn ping and it says answer questions below which TCP ping scan does not require a privilege account so let's type privilge so it says privilege use TCB sin packets all right let's see does not requires so sin ping right or is it same yeah does not uh I believe is UTP right UTP might be might be wrong requires privilege account let's see I think it's TCP at ping yeah knowledge yeah and what option do you need to add to mmap to run TCP SN ping scan on telet Port so telet uses Port 23 so it says impa Instinct option to use port number for example SL ps21 Target 21 right so it's tell is 23 so PS yeah and lastly task eight using reverse TNS lookup just talks about another tool query and answer questions below we want and out to issue reverse DNS logo for all possible posts and on subnet hoping to get some insights from the names what option should we add and it says reverse it's pretty obvious is SLR yeah and lastly task n summary just talks about ARP icmp TCP UDP and then there's a scan type example command and you can read through all that and answer questions below ensure you have taken note of all M options explaining this rule to continue learning about M please join M basic Port scans which induce the basic types of Port scans complete and that's it guys uh you can show on Twitter Facebook Lin to show you complete a room as a show on my link in um if you like this video guys please give a thumbs up hit the Subscribe button hit notification button try to pump these videos at least two or three times on a weekly basis and let me see if I can so we're doing the count pin test and uh we just did map live poost Discovery and I'm going to reset in basic Port scans for the next video and again just want to show you guys that not transitioning the IT industry and I have current and certifi on comp TI a A+ cyssa Plus network plus pentest plus Security Plus and I plus certification I'm studying cl angos to end my year of 2023 anyway guys thanks for watching till the next one
Info
Channel: PLei
Views: 178
Rating: undefined out of 5
Keywords: Pentest, TryHackMe
Id: hcPrUaNCn1s
Channel Id: undefined
Length: 18min 41sec (1121 seconds)
Published: Wed Dec 06 2023
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.