1 00:00:00,810 --> 00:00:07,250 So, guys, we have seen in the previous video that how we can perform operating system fingerprinting 2 00:00:07,650 --> 00:00:08,770 now in this video. 3 00:00:08,790 --> 00:00:11,310 We will talk about network mapping. 4 00:00:11,580 --> 00:00:21,090 OK, so what is network mapping where mapping is basically means that how we can detect the exact energy 5 00:00:21,270 --> 00:00:22,770 in our target network. 6 00:00:23,360 --> 00:00:28,600 OK, how are our resources placed in our target network? 7 00:00:28,860 --> 00:00:35,340 So for this practical, I have turned off all of my virtual machines and I am using my main machine, 8 00:00:35,340 --> 00:00:37,500 my physical machine for the spectacle. 9 00:00:37,800 --> 00:00:41,030 And I have connected this to my mobile hotspot. 10 00:00:41,430 --> 00:00:41,780 Right. 11 00:00:41,910 --> 00:00:48,540 I am doing this just to confirm whether and detects the exact apology or not. 12 00:00:48,720 --> 00:00:53,370 OK, so let's open the Zen map now. 13 00:00:54,330 --> 00:00:55,740 Let's take the command here. 14 00:00:55,860 --> 00:01:03,330 OK, so map hyphen Espin for network mapping and then the network address. 15 00:01:03,510 --> 00:01:03,940 OK. 16 00:01:05,790 --> 00:01:11,310 Remember, not by paper, a particular IP instead to give a network address. 17 00:01:12,520 --> 00:01:22,260 So slash 24 right now let's perform the scan and let's see whether a map is able to detect the topology 18 00:01:22,260 --> 00:01:22,880 or not. 19 00:01:29,850 --> 00:01:37,680 See, the purpose of this lesson is basically a network mapping, right, so it says, see, this is 20 00:01:37,680 --> 00:01:39,650 the Mac address of my mobile phone. 21 00:01:40,440 --> 00:01:40,750 Right. 22 00:01:42,180 --> 00:01:45,570 And this is my main machine. 23 00:01:45,630 --> 00:01:45,990 OK. 24 00:01:46,020 --> 00:01:47,440 And this is its IP. 25 00:01:47,880 --> 00:01:54,240 So it says total 256 IP addresses is scanned in 15 seconds and two hoster up. 26 00:01:54,420 --> 00:01:54,750 Right. 27 00:01:54,960 --> 00:01:59,520 So let's switch to topology and see you guys see. 28 00:02:00,490 --> 00:02:05,050 It's it has detected the exact topology which I have used. 29 00:02:06,220 --> 00:02:13,130 I have connected my main machine with my hotspot using wireless adapter, right. 30 00:02:14,890 --> 00:02:16,660 So, yes, it works. 31 00:02:16,900 --> 00:02:22,920 OK, so it is able to detect the exact overloaded used in our target network. 32 00:02:22,960 --> 00:02:23,390 OK. 33 00:02:23,710 --> 00:02:32,050 And it is important because by using this, we have an idea of how our resources are placed in our target 34 00:02:32,050 --> 00:02:32,590 network. 35 00:02:32,740 --> 00:02:33,160 OK.