1 00:00:00,480 --> 00:00:06,990 In the previous video, we talked about Google hacking that is getting the exact output from Google 2 00:00:06,990 --> 00:00:14,280 that we are expecting right now in this lesson, we will start with the second phase of hacking. 3 00:00:14,280 --> 00:00:16,040 That is a scanning, OK? 4 00:00:16,320 --> 00:00:18,690 And we are going to use two tools for this. 5 00:00:18,720 --> 00:00:25,910 One is and another is it's been three utility, see, and that is a great tool for network scanning. 6 00:00:26,280 --> 00:00:29,810 OK, and it is available in graphical Watson as well. 7 00:00:29,970 --> 00:00:32,700 And this call is Zimet for Windows. 8 00:00:33,240 --> 00:00:41,580 OK, so let's open up Karley and let's open the terminal and let's see how we can use a map so and map 9 00:00:41,590 --> 00:00:42,630 hyphenates hyphen. 10 00:00:42,630 --> 00:00:43,630 It is for help. 11 00:00:45,000 --> 00:00:45,260 Right. 12 00:00:45,870 --> 00:00:50,010 So here is a list of all of the options available to be used with. 13 00:00:50,670 --> 00:00:51,020 Right. 14 00:00:51,300 --> 00:00:55,110 But we will start with the basic one that is Hyphen Espin. 15 00:00:55,740 --> 00:00:56,120 OK. 16 00:00:56,950 --> 00:01:00,500 Remember, Linux is Agustin's to do OK. 17 00:01:00,930 --> 00:01:10,410 So Hyphen Essene is in lowercase and then by your network address lets it one slash twenty four. 18 00:01:10,920 --> 00:01:16,170 OK now hyphen Essene will disable board scanning. 19 00:01:16,500 --> 00:01:21,680 OK, it will only look for the life system or host in a network. 20 00:01:22,290 --> 00:01:22,620 Right. 21 00:01:23,220 --> 00:01:30,180 So scanning means looking for the life system in our target network or looking for the life and services 22 00:01:30,180 --> 00:01:31,430 in a target system. 23 00:01:32,970 --> 00:01:33,220 Right. 24 00:01:33,600 --> 00:01:38,070 So we will using a map just to look for life systems in our network. 25 00:01:38,820 --> 00:01:45,100 See it says a total of five housetop, OK, in which one is allowed. 26 00:01:45,960 --> 00:01:49,300 OK, and these two are network interface card. 27 00:01:50,350 --> 00:01:56,160 OK, one is window and another is. 28 00:01:57,060 --> 00:02:01,200 Let's take the IP for Garley C then not zero four. 29 00:02:01,480 --> 00:02:06,050 OK, and now let's look for two dot seven. 30 00:02:07,140 --> 00:02:10,440 So let's take the IP off our window then. 31 00:02:10,440 --> 00:02:16,240 Virtual machine IP config C 237. 32 00:02:17,400 --> 00:02:24,930 OK, so this is how we can use and map to discover life just in our target network. 33 00:02:25,860 --> 00:02:26,310 OK.