Download VMWare Player – a free product to run your VMWare virtual machines. Lisa Bock demonstrates using pre-made machines freely available online such as Kali Linux and Windows Machines. Discover modifying the interface settings and obtaining an IP address and set up a small network and ping the other machine.
- [Voiceover] In order to demonstrate some of the tools used in scanning, I've set up a small network, using pre-made images and machines freely available online. If you can see in this graphic what we have is Kali Linux, Windows, the Virtual Switch which is created automatically, all inside the VMware Player Environment. This is the page where you can download and install a free copy of VM Workstation Player.
Now here is where you can download virtual machines for Windows. These are short term. As you can see they're most likely going to be about 90 days and they will time out. You'll choose your operating system, for example you want to choose Windows and IE10 on Windows 7. And a platform VMware. And you'll download and install that. And on Kali.org you can download the ISO's if you would like to.
As we can see as I scroll down here, we can download Kali Linux Vmware, VirtualBox and ARM images. I've selected Kali virtual images, and it's taken me to this website. Scroll down, and select the version you would like. Just some other notes that you should see on their worksheet. Kali has a default username "root", and a password of "toor" and may have pre-generated SSH host keys.
Windows password is "Passw0rd!" with a zero and exclamation point. And make sure you can ping both machines. And firewall settings may have to be adjusted. Then you should be good to go.
This course investigates the scanning tools and techniques used to obtain information from a target system, including specially crafted packets, TCP flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can identify live systems via protocols, blueprint a network, and perform a vulnerability scan to find weaknesses. She also introduces some of the tools and techniques that hackers use to counter detection via evasion, concealment, and spoofing. In addition, learn how to reduce the threat of tunneling, a method hackers use to circumvent network security.
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10.
- Scanning overview
- Port scanning countermeasures
- Scanning and querying DNS
- Scanning with ICMP
- Mapping (or blueprinting) a network
- Scanning for vulnerabilities
- Using tools such as hping and NetScan
- Evading detection
- Concealing your network traffic
- Preventing tunneling