1 00:00:00,420 --> 00:00:07,380 In this small section, we're going to cover how we can use and map in our advantage to be able to bypass 2 00:00:07,380 --> 00:00:12,900 some of the security measures that the target might have, such as firewalls and IEDs. 3 00:00:13,800 --> 00:00:17,310 These options that we will use in a map can be considered advanced. 4 00:00:17,340 --> 00:00:23,220 So don't worry if you don't fully understand everything that we talked about in next few videos, just 5 00:00:23,220 --> 00:00:27,840 make sure that in case there is something that you didn't understand, what should we do a few times? 6 00:00:27,990 --> 00:00:29,190 And you will get it. 7 00:00:29,850 --> 00:00:34,500 But wait, Alexa, I don't even know what fireball or IEDs is. 8 00:00:35,400 --> 00:00:36,750 So what are they? 9 00:00:37,800 --> 00:00:45,360 Well, Farwell is a network security system that monitors network traffic, and it is based on the security 10 00:00:45,360 --> 00:00:46,950 rules that are predetermined. 11 00:00:48,210 --> 00:00:55,710 There are two types of phorbols, network formals and host based firewall's network phorbols filter 12 00:00:55,710 --> 00:01:02,670 traffic between two or more networks, while host based firewalls only filter traffic that is going 13 00:01:02,670 --> 00:01:05,340 in or out from that specific machine. 14 00:01:05,970 --> 00:01:11,310 And what the it is, is intrusion detection system. 15 00:01:12,300 --> 00:01:17,370 It is usually a software application that monitors network for any malicious activity. 16 00:01:17,790 --> 00:01:24,510 For example, some of the map scans that we did in the previous section can get caught by intrusion 17 00:01:24,540 --> 00:01:25,580 detection system. 18 00:01:26,310 --> 00:01:31,700 So in this section, we will check out a few options that could help us bypass that. 19 00:01:32,160 --> 00:01:37,830 All in all, firewall and IDs helps us secure our network or machine. 20 00:01:38,520 --> 00:01:46,580 In the previous section where we covered the basics, we used our Linux machine and we scanned our political 21 00:01:46,740 --> 00:01:47,250 target. 22 00:01:47,640 --> 00:01:49,530 We scanned different ports. 23 00:01:49,530 --> 00:01:55,890 And with the scans that we did, we managed to figure out what ports are open and what ports are closed. 24 00:01:56,520 --> 00:02:01,700 But some of our targets might host services on ports hiding behind the firewall. 25 00:02:02,370 --> 00:02:08,940 And once we scan them, it will tell us those ports are filtered, which we know that it means, and 26 00:02:08,940 --> 00:02:12,810 MAP can figure out whether that port is open or closed. 27 00:02:13,320 --> 00:02:20,490 What this means is that we're sending packets to the target, but their firewall keeps dropping those 28 00:02:20,490 --> 00:02:20,970 packets. 29 00:02:21,300 --> 00:02:27,220 And in this section we're going to see what and options can help us in bypassing this. 30 00:02:27,630 --> 00:02:29,160 Let's get straight into it.