1 00:00:00,660 --> 00:00:09,720 So we have seen how we can perform scanning to detect life host in a network or lifeboats and services 2 00:00:09,720 --> 00:00:13,920 in our target PC or topology. 3 00:00:14,400 --> 00:00:19,020 Now we will see how to perform operating system fingerprinting. 4 00:00:19,310 --> 00:00:22,050 OK, so what is operating system fingerprinting? 5 00:00:22,440 --> 00:00:30,210 Well, it means trying to detect the operating system running in our target machine. 6 00:00:30,700 --> 00:00:37,230 OK, so let's see how we can discover that Wiclif operating system is running in our target machine. 7 00:00:37,530 --> 00:00:40,980 So first of all, let's switch to Karley and let's open the terminal. 8 00:00:41,970 --> 00:00:46,830 OK, now let's say our target is manassero level. 9 00:00:47,850 --> 00:00:50,370 OK, so let's check its IP. 10 00:00:51,780 --> 00:00:53,850 OK, Bendat Order 2.5. 11 00:00:56,800 --> 00:01:07,690 So we will use and map for this as well, how small s and capitalis for A and saying, OK, now hyphen 12 00:01:07,690 --> 00:01:15,000 capital all for fingerprinting, OK to detect operating system so that MFL scan for the operating system, 13 00:01:15,400 --> 00:01:19,260 OK, and then the IP of the target machine. 14 00:01:19,750 --> 00:01:20,170 Right. 15 00:01:20,500 --> 00:01:25,780 That is Meadow's floatable now and started scanning process. 16 00:01:25,780 --> 00:01:29,110 And let's see whether it rejects the correct open system or not. 17 00:01:34,250 --> 00:01:39,410 So we have to wait until and finishes its scanning process completely. 18 00:01:42,640 --> 00:01:48,540 OK, so the process has been completed and it has mentioned that this number of ports are open, OK, 19 00:01:49,060 --> 00:01:51,160 and yes, it detects the open system. 20 00:01:51,190 --> 00:01:54,340 It says it's running Linux to DOT six. 21 00:01:55,240 --> 00:01:59,680 So, yes, guys might as well to actually works on Linux to load suspect form. 22 00:02:00,360 --> 00:02:05,290 OK, so it says Oyster Diction performed, right. 23 00:02:06,790 --> 00:02:09,390 Vanderhorst up again to same time. 24 00:02:09,400 --> 00:02:10,930 Is this much. 25 00:02:11,080 --> 00:02:12,990 OK, so around 22 seconds. 26 00:02:13,750 --> 00:02:15,700 So yes, it's actually works. 27 00:02:15,730 --> 00:02:18,860 OK, now let's see the Zenab. 28 00:02:18,880 --> 00:02:25,270 OK, so let's switch to the windows and let's see whether Sendek will perform its functions well or 29 00:02:25,270 --> 00:02:25,700 not. 30 00:02:26,920 --> 00:02:32,860 So let's open this up and here mention the target IP. 31 00:02:32,870 --> 00:02:36,920 So suppose in this case I am targeting my host machine. 32 00:02:36,970 --> 00:02:41,980 OK, now here, let's edit the combined. 33 00:02:43,810 --> 00:02:55,570 To this one, OK, now click on scan so and mappers started scanning and we are running the latest version 34 00:02:55,570 --> 00:02:57,700 of a map that is surrendered. 35 00:02:57,730 --> 00:02:58,630 Seven or. 36 00:03:05,090 --> 00:03:10,310 And here is the output and it is a little bit confusing. 37 00:03:10,550 --> 00:03:17,270 OK, I think this maybe because I have turned on all of my security is like firewall and Windows defender. 38 00:03:18,530 --> 00:03:25,520 So it says Microsoft Windows, Longhorn, Windows 10, then Windows Attendants over 2000 and then Windows 39 00:03:25,520 --> 00:03:27,780 eight, then Windows and then Windows open. 40 00:03:28,640 --> 00:03:31,690 OK, so it's a confusing result. 41 00:03:32,600 --> 00:03:34,940 I think this is because of the security, right. 42 00:03:38,050 --> 00:03:43,450 See, it says 94 percent accuracy for Microsoft Windows Long-horned. 43 00:03:44,560 --> 00:03:51,730 OK, so this is how we can perform basic operating system fingerprinting, either using and mapping 44 00:03:51,730 --> 00:03:54,350 Garley or by using Zend mapping windows. 45 00:03:54,770 --> 00:03:55,240 OK.