Network Footprinting 2 Part 3 Transcript

Print

We want to do reconnaissance, or discovery, on the entire network, 192.168.0.0, not just the host or the network element, 192.168.0.1, the domain controller. Not always we want to do a discovery on every network element in that network. Okay, and then click on scan.

This one, you may wonder why we're doing this. This time, we just don't wanna find out about what's involved to gather information from a single target machine, but an entire network, we're trying to find out graphically, as you can see. Whereas the Nmap alone, the output was directed to a file called host.txt, this way it's graphic, GUI displayed here.

Step 13 says this will scan available hosts in the mentioned network. Wait for the scan to finish, 'cause it takes a while to finish. But when it's done, the hosts are displayed on the column here, and the results of open ports, and other information gathered is in the main pane. We wait for the scan to get finished, and then we click on 192.168.0.1. Still processing. In that network, of course, you know there are more hosts, other than the Linux, the Windows client. There are most hosts, as you can see, right here.

Now, the scan is finished. Click on 0.1 to view the details, as there's the detail, information gathered. Click on the Topology, and then click on Fisheye. Topology, and Fisheye. This is a topology of the network that it discovered, the scan. This is valuable information. Of course, in the wrong hands, it's dangerous information. The Topology tab shows the discovered network hosts detected by the scan. Click on Host Details. Information pertaining to specific target machine, or host, or network element is displayed here. Notice the operating system, the name, the server spec, and so on.

Again, this is potent, dangerous information in the names of an intruder or a hacker. Click on Ports and Hosts to see just the protocols and the ports, associated ports, which ones are open. And this is again important information that needs to be guarded. Anyway, that's it, for the second part of network footprinting, reconnaissance, or discovery using Zenmap and Nmap, and I hope that you found this information helpful, and useful in your process of getting the lab done. Thank you very much, and look forward to meet you in future video slides, video tutorials.

[End of Audio]