1 00:00:00,470 --> 00:00:01,520 So what is in, man? 2 00:00:03,360 --> 00:00:08,370 Now, one of the stages of our penetration testing is exploration, right? 3 00:00:09,950 --> 00:00:15,560 So the aim of that is to collect as much information as possible about whatever target that we want 4 00:00:15,560 --> 00:00:16,100 to test. 5 00:00:17,430 --> 00:00:23,430 And then according to all of this information that we gather, that target is identified and we can 6 00:00:23,430 --> 00:00:31,110 identify the vulnerabilities and detect the possible dangers by launching different kinds of attacks. 7 00:00:31,890 --> 00:00:40,170 So and map or network map, it is an open source program that performs this idea of network mapping. 8 00:00:41,420 --> 00:00:45,290 And map, I would say, is indispensable as a tool for penetration testing. 9 00:00:46,610 --> 00:00:51,860 And and MAP is one of the programs that's used for active discovery. 10 00:00:53,820 --> 00:00:57,240 So you may think, OK, yeah, but what can we do with Unmap? 11 00:00:58,420 --> 00:01:06,130 Well, within map, we can scan either small or large networks, we can identify the computers on the 12 00:01:06,130 --> 00:01:10,690 network that are open as well as the operating systems that they're running. 13 00:01:12,300 --> 00:01:14,340 You can detect open ports. 14 00:01:15,850 --> 00:01:19,360 You can identify the services and versions that are open. 15 00:01:21,230 --> 00:01:23,300 You can scan without capturing a firewall. 16 00:01:25,400 --> 00:01:29,720 You can scan for vulnerabilities in these overnight services and ports. 17 00:01:30,760 --> 00:01:32,500 You can launch brute force attacks. 18 00:01:34,590 --> 00:01:38,520 You can also customize your own scans by writing scripts yourself. 19 00:01:39,490 --> 00:01:42,490 And of course, you can and I didn't use existing script. 20 00:01:44,430 --> 00:01:45,480 So why is Inma? 21 00:01:47,370 --> 00:01:54,450 Well, like I said, and Map is fully open source, so there's very strong documentation support. 22 00:01:55,520 --> 00:02:01,370 You can find a whole lot of resources and application examples just by searching Internet. 23 00:02:03,420 --> 00:02:08,250 You can follow different versions at and map, Doug. 24 00:02:10,200 --> 00:02:16,200 There's lots of questions and answers to those questions and other support for problems that you may 25 00:02:16,200 --> 00:02:18,060 experience on many blog site. 26 00:02:21,210 --> 00:02:25,110 Also, you can install and map on Windows, Linux or Mac OS. 27 00:02:27,780 --> 00:02:34,290 So how can we find and map documents well available and map commands can be displayed on the command 28 00:02:34,290 --> 00:02:34,550 line? 29 00:02:35,510 --> 00:02:38,480 Just by entering the text does help. 30 00:02:40,580 --> 00:02:44,270 Now, the unmap official site and map dot org. 31 00:02:45,410 --> 00:02:52,610 Will contain different versions of and map and specific to the different supported operating systems. 32 00:02:54,120 --> 00:02:56,340 You can also access and map documents. 33 00:02:58,450 --> 00:03:04,300 And you can get information about maybe some problems that you're experiencing at the blog site. 34 00:03:05,880 --> 00:03:08,250 Now, once you get some experience, you can also contribute. 35 00:03:08,670 --> 00:03:10,230 So how does unmap work? 36 00:03:10,930 --> 00:03:14,760 So in general, this is how we use the unmap command. 37 00:03:15,730 --> 00:03:19,540 Right, the example and Matt and tell it some parameters. 38 00:03:21,570 --> 00:03:25,980 And the basic and map operation stages goes like this. 39 00:03:26,880 --> 00:03:27,600 Ping scanning. 40 00:03:28,800 --> 00:03:29,550 Port scanning. 41 00:03:30,840 --> 00:03:37,740 Service and version detection, operating system detection, script scanning, timing. 42 00:03:39,170 --> 00:03:43,550 Ipsen ideas, jumping and scanning of large networks. 43 00:03:43,820 --> 00:03:44,780 So let's get started.