1 00:00:00,240 --> 00:00:08,620 And now my friends it's lab time. It's just a jump to the left. 2 00:00:08,740 --> 00:00:12,100 Please try to perform these steps in your lab environment. 3 00:00:13,040 --> 00:00:20,880 First, go to your Nessus web interface. Create a new scan policy see and modify the options as much as 4 00:00:20,880 --> 00:00:21,710 you can. 5 00:00:22,490 --> 00:00:29,100 Choose destinations, try to get a text file as the destination hosts list. 6 00:00:29,120 --> 00:00:33,970 Start the scan and analyze the results. 7 00:00:33,970 --> 00:00:39,310 So you've made it to the end of the Course, but before you run out testing every single network you can 8 00:00:39,310 --> 00:00:40,150 find. 9 00:00:40,220 --> 00:00:44,410 Let's remember what we learned in this course. 10 00:00:44,460 --> 00:00:51,300 Firstly we learned how to prepare the lab environment how to download and set up Metasploitable 2 to compromise. 11 00:00:53,120 --> 00:01:01,600 Scan types passive scans and active scans. Perform some passive scans using Wireshark and ARP tables. 12 00:01:01,600 --> 00:01:10,000 The fundamentals of the TCP/IP family were the basics of TCP and UDP protocols. Active scan in detail 13 00:01:10,030 --> 00:01:12,730 using Nmap. 14 00:01:12,810 --> 00:01:21,310 The most important Nmap scan types: No port scan also known as -SAY IT WITH ME- Ping scan. SYN scan, 15 00:01:21,870 --> 00:01:30,210 TCP scan and UDP scan. Comparison of the SYN scan and the TCP scan. 16 00:01:30,220 --> 00:01:32,990 What about the details of Port scanning. 17 00:01:33,010 --> 00:01:37,630 We also learned about the service and the version detection and why that's important. 18 00:01:39,770 --> 00:01:43,730 And how to detect the operating system of a host. 19 00:01:43,730 --> 00:01:52,140 The details of input and output management in Nmap. Nmap scripting engine or NSE performing scripts. 20 00:01:53,880 --> 00:01:59,130 Some important scripts and timing in Nmap scans. 21 00:02:03,060 --> 00:02:08,770 We also learned about bypassing IDS and IPS devices. 22 00:02:08,940 --> 00:02:19,590 And remember some of the other and Nmap scans, NULL scan, FIN scan, XMAS scan, ACK scan, Idle scan. 23 00:02:19,610 --> 00:02:27,400 We also went into the definition of vulnerability and then scanning vulnerabilities with Nessus. 24 00:02:27,540 --> 00:02:34,170 We went over how to download install and run Nessus on Kali and how to perform a Nessus vulnerability 25 00:02:34,170 --> 00:02:40,250 scan and export the result reports. And that about does it for me. 26 00:02:40,250 --> 00:02:45,800 I really hope you enjoy the course and I hope to see you in another cybersecurity course. 27 00:02:45,860 --> 00:02:46,880 Till then stay safe. 28 00:02:46,880 --> 00:02:47,480 My friends.