1 00:00:01,030 --> 00:00:02,170 Now what is about? 2 00:00:03,270 --> 00:00:08,070 The vote is a virtual location where networking communication starts and ends in a nutshell. 3 00:00:09,450 --> 00:00:14,190 So for more in-depth explanation, we need to establish a little background information. 4 00:00:14,520 --> 00:00:23,190 There are two kinds of network boss on each computer 65000 and five hundred thirty six e of each for 5 00:00:23,190 --> 00:00:28,950 a total of one hundred thirty one thousand and eighty two network bots. 6 00:00:29,700 --> 00:00:33,210 And these are considered as TCP and UDP. 7 00:00:33,600 --> 00:00:33,980 OK. 8 00:00:35,110 --> 00:00:41,080 Now, each computer has an internet protocol, the IP address, which is how the network knows which 9 00:00:41,080 --> 00:00:42,460 computer to send packets to. 10 00:00:43,030 --> 00:00:48,190 So if you send a Beckett to the IP address, the computer knows what more to Iraq. 11 00:00:48,190 --> 00:00:55,060 The Beckett to based on application or packet contains a service running on the computer needs to listen 12 00:00:55,060 --> 00:00:56,770 on a designated board. 13 00:00:57,910 --> 00:01:06,790 So the first 1023 ECB boards are the well known boards reserved for applications like FTB, the 21, 14 00:01:07,250 --> 00:01:09,130 GTB 80 or as such. 15 00:01:09,190 --> 00:01:09,910 The 22. 16 00:01:10,850 --> 00:01:17,570 And the Internet assigned numbers authority, the IANA reserves these boys to keep them standardized 17 00:01:18,260 --> 00:01:26,360 ECB boards from one thousand twenty four to forty nine thousand and one hundred fifty one are available 18 00:01:26,360 --> 00:01:31,310 for use by services or applications, and you can register them with Ayana. 19 00:01:31,760 --> 00:01:39,050 So they are considered CME Reserve bought forty nine thousand one hundred fifty two and they are free 20 00:01:39,050 --> 00:01:46,520 to use now to start with board scanning basics about scanners since TCP or UDP network packet and ask 21 00:01:46,520 --> 00:01:48,320 the board about their current status. 22 00:01:48,740 --> 00:01:52,670 The three types of responses are below which is open or accepted. 23 00:01:52,880 --> 00:01:57,120 The computer response and ask if there are anything it can do for you. 24 00:01:57,770 --> 00:01:59,090 Closed or not listening. 25 00:01:59,390 --> 00:02:05,390 The computer responds that this what is currently in use and and available at this time or filter drop 26 00:02:05,570 --> 00:02:06,020 blocked. 27 00:02:06,470 --> 00:02:12,590 The computer doesn't even bother to respond, so we either have a response or without this point all 28 00:02:12,590 --> 00:02:13,160 we have. 29 00:02:13,490 --> 00:02:16,010 I respond that the bot is currently in use. 30 00:02:16,190 --> 00:02:16,580 OK. 31 00:02:18,210 --> 00:02:21,090 Now, let's start with port scanning techniques now. 32 00:02:21,420 --> 00:02:28,470 By the way, this is just a general idea about the scanning techniques we would have in depth about 33 00:02:28,470 --> 00:02:33,390 the end map scanning techniques, noise and fury way, OK? 34 00:02:33,420 --> 00:02:36,450 And we would have the hands on later on the big scan. 35 00:02:36,720 --> 00:02:38,100 This is the simplest scan. 36 00:02:38,370 --> 00:02:43,350 A big scan looks for any icy and be stabilized indicate if a target is alive. 37 00:02:44,100 --> 00:02:53,370 ECB have opened a first and common scan death request and it is or EQ or a kinetic bucket from a computer 38 00:02:53,610 --> 00:02:58,470 also called esin, which means a synchronization or synchronized scan. 39 00:02:58,650 --> 00:02:59,070 OK. 40 00:03:00,230 --> 00:03:06,260 ECB Connect, similar to the TCB, have all been scanned, but the ECB Connect scan completes that ECB 41 00:03:06,260 --> 00:03:06,800 connection. 42 00:03:08,250 --> 00:03:11,130 Wouldbe, which is a slower than TCB scan. 43 00:03:11,580 --> 00:03:17,550 I you'd be scanned works best when you send a specific payload to target, such as the NSA request. 44 00:03:18,150 --> 00:03:24,120 And we have this stealth scanning quite and an obvious stealth scanning is commonly used by hackers 45 00:03:24,120 --> 00:03:25,020 for this reason. 46 00:03:26,340 --> 00:03:28,860 Now, what are the difference between TB and GDP? 47 00:03:29,250 --> 00:03:35,580 Now we learn that we have ECB Connect UDP still scanning its behalf open in Cincinnati, what is that? 48 00:03:36,030 --> 00:03:41,100 We will talk about it right away TB and you know, we are the two most common protocols used for the 49 00:03:41,100 --> 00:03:44,220 IP networks on the internet protocol networks. 50 00:03:45,290 --> 00:03:50,960 ECB or transmission control protocol is a nice, orderly transaction protocol. 51 00:03:51,980 --> 00:03:57,470 He's happy since each bucket in order, complete with checking verification and a three way handshake 52 00:03:57,740 --> 00:04:02,150 to confirm each bucket is successful, which is the sin sinek and. 53 00:04:03,020 --> 00:04:06,940 Now I'm assuming that you have a simple idea of how this would be walked. 54 00:04:07,100 --> 00:04:08,420 OK, so I will move on. 55 00:04:10,650 --> 00:04:14,160 Now used to be the Zind have any around checking, but tends to be faster. 56 00:04:15,030 --> 00:04:20,160 And lives theater and streaming and online video games over news, you would be for this reason because 57 00:04:20,160 --> 00:04:20,820 it's faster. 58 00:04:21,149 --> 00:04:26,010 You would be is a conviction less political, so programs that use you would be just in the data. 59 00:04:26,160 --> 00:04:30,750 And if you miss a it, you will never get it again because it is a connection. 60 00:04:30,960 --> 00:04:33,810 There are no three way handshaking, as we learned from here. 61 00:04:33,930 --> 00:04:35,230 The Cincinnati Act. 62 00:04:35,290 --> 00:04:38,490 OK, so that's why it is faster and connections. 63 00:04:39,000 --> 00:04:43,050 Now again, I'm assuming that you are familiar or have a simple idea. 64 00:04:43,500 --> 00:04:44,490 What is the TCB? 65 00:04:44,490 --> 00:04:46,830 What is the would-be and how they walks? 66 00:04:46,930 --> 00:04:47,350 OK. 67 00:04:47,460 --> 00:04:48,690 In a nutshell, that's it. 68 00:04:49,500 --> 00:04:54,060 So if you are not these, you can just google it and how TCB works. 69 00:04:54,180 --> 00:04:56,540 Just read the simple article. 70 00:04:56,580 --> 00:04:57,390 It's no big deal. 71 00:04:57,750 --> 00:05:03,890 What we need to hear is you need to have a just a simple idea how GCB works. 72 00:05:04,110 --> 00:05:09,960 The three three way checking, verification, checking that connection this and the difference between 73 00:05:10,110 --> 00:05:15,840 this fee, and you'd be just as simple as that just type difference or TCB versus you.