Hacking with NMAP - How to Scan a Network

Поділитися
Вставка
  • Опубліковано 18 жов 2024

КОМЕНТАРІ • 94

  • @sri9277
    @sri9277 2 роки тому +26

    Chris please make nmap series in depth

    • @CFH298
      @CFH298 2 роки тому +10

      Upvoted!

    • @ChrisGreer
      @ChrisGreer  2 роки тому +16

      Thanks for the suggestion! I will keep up the content. I appreciate the feedback - helps me know what content you guys are interested in!

    • @ChrisGreer
      @ChrisGreer  2 роки тому +3

      @@bearsnake3394 Nice job on the -s question. Nice to meet you and thanks for the comment!

    • @govindpandit2017
      @govindpandit2017 2 роки тому

      ECN and CWR please!

    • @adedejiemmanuel1
      @adedejiemmanuel1 2 роки тому

      You're awesome.

  • @EETechStuff
    @EETechStuff 2 роки тому

    Chris, thanks so much. Your teaching is amazing. I've been an electrical engineer for just under 45 years, and I'm getting back into networking and wireshark. Recently I've been investigating why a particular website is slow and inconsistent when accessed from my Virtualbox/Ubuntu VM, but perfect when accessed from my W10. Your "keep your eye on the ball" advice helped me to filter out all the irrelevant conversations when starting a blank Firefox (wow, that's a lot of junk, and 10 second keep alives), so now I'm seeing just the relevant conversation directly with the website. Still trying to figure why I'm sending RST's, but I think I'm now reasonably confident that my VM buffer/window isn't the limiting factor. Anyway, thanks again. Oh, and learning to enable "Name Resolution" is heaven for me :)

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Wow thanks for the comment! Great job on the pcap with that website. Let me know if you want me to take a second look at it for you. I'll see you around the channel!

    • @EETechStuff
      @EETechStuff 2 роки тому +1

      @@ChrisGreer Chris, thanks, but just as I received your reply I made the stunning breakthrough that the website isn't playing nicely with Firefox, but Chrome works great. The website owner thought maybe my VM was the culprit, but I'll let him know he's got some work to do :) Thanks again.

  • @freeethnker
    @freeethnker 2 роки тому +3

    Great video, Chris. Really liked the explanation between the two nmap scan types. Looking forward to your next nmap video.

  • @JohnPaulsEuropa
    @JohnPaulsEuropa 2 роки тому +3

    Great stuff Chris, really appreciate your workflow and transfer of knowledge in your topics.

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Thanks for the comment John!

  • @teerich2011
    @teerich2011 2 роки тому +1

    Going to watch multiple more tines to prep for Net+. Thx!

  • @amritpalbadhan205
    @amritpalbadhan205 Рік тому

    Hi Chris, i love your style of explanation things with wireshark. Hope to see more
    Videos.

    • @ChrisGreer
      @ChrisGreer  Рік тому

      Thanks! Be sure to check out my new Nmap course - www.bit.ly/udemynmap

  • @jpblsec
    @jpblsec 2 роки тому

    You are awesome. Best explanation.
    Joining nmap and Wireshark is sick.

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Thanks for watching and for the comment!

  • @khayla_matthews
    @khayla_matthews 2 роки тому

    Love this series 👍🏾 this video was great

  • @nafmee
    @nafmee 2 роки тому

    We want more nmap tutorials.
    And thank you for sharing!

  • @ianp6742
    @ianp6742 2 роки тому

    Great video Chris! Can't wait to see more of these

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Thanks Ian. More on the way!

  • @majiddehbi9186
    @majiddehbi9186 2 роки тому

    hi chris great to see u again , i saw your video with Mr Bombal such a good one thx for all contribution , by tha way chris u remind me one things u re like a radiologiste in medecin he see the real stuff of the bodies,
    like u , u see the real stuff of the packets thinks a keep given

  • @SharukhKhan-kf7fj
    @SharukhKhan-kf7fj 2 роки тому +1

    Chris your explanation amazing...
    Please upload videos on nmap, bettercap, ettercap and also on others tools..
    Love from pakistan..

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      I will! Thanks for the comment.

  • @PandaandSparrow
    @PandaandSparrow 2 роки тому

    Thanks Chris for sharing this video with us. I am actually studying for the Security+ right now (this moment) and need to learn this.

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Awesome! Good for you - yes definitely try and remember the nmap stuff. I'll do my best to help. :-)

  • @HairEEck
    @HairEEck 2 роки тому

    I would love more videos on scanning tools and their different options. Sometimes my scan just come back with nothing despite me doing "everything correctly", learning why they fail would be cool

  • @KaySwiss21
    @KaySwiss21 2 роки тому

    Love the nmap in depth idea!

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      I’ll keep them coming!

    • @KaySwiss21
      @KaySwiss21 2 роки тому

      @@ChrisGreer might consider adding the "Join" option for those of us who would like to support your work. For now I'ma grab a coffee mug from your store! Keep it coming

  • @MrBitviper
    @MrBitviper 2 роки тому

    thanks for the video chris. awesome stuff as always
    you have a great talent for teaching

  • @vyasG
    @vyasG 2 роки тому

    Great Explanation. Thank you.

  • @fabienb3432
    @fabienb3432 2 роки тому

    Great vidéo ! I always wondered what could be the point of steath scan since most firewalls would log even just a syn packet, but I did not know that some system would log a connection only after the 3-way handshake.

  • @nd.b77
    @nd.b77 2 роки тому +1

    Awesome! These scans has been added as filter-buttons to the „Security“ profile we recently created in another video on this channel. Now, when anybody knocks on my servers door trying to be stealthy, he will get caught with a single click, muahahahar! ;)

  • @clementyves6154
    @clementyves6154 2 роки тому

    Very nice content ! Great work, thanks !!

  • @faran_siddiqui-d3t
    @faran_siddiqui-d3t 2 роки тому

    Thank you for this Chris. I've been waiting for it. If you know you know🔥😋

  • @JoseCastro-ql1yl
    @JoseCastro-ql1yl 2 роки тому

    You are the best!!

  • @gultekinbutun7910
    @gultekinbutun7910 2 роки тому

    Great video, thanks a lot sharing with us.

  • @rajeshsagar3912
    @rajeshsagar3912 2 роки тому +1

    that was a nice video chris

  • @homayounshokri5041
    @homayounshokri5041 2 роки тому

    Perfect as always

  • @SpookiePower
    @SpookiePower 2 роки тому

    Thanks. Loves your nmap videos :)

  • @gurney9275
    @gurney9275 2 роки тому

    Great video. Thanks for sharing.

  • @oliver411
    @oliver411 2 роки тому

    Very clear explanation. Though - why would one choose full tcp scan over the stealth one? I see no upsides. Thanks

    • @justindittburner216
      @justindittburner216 2 роки тому +1

      If you are doing pen testing from within a company and don't need to worry about setting off alerts. You want to be as thorough as possible

    • @oliver411
      @oliver411 2 роки тому

      @@justindittburner216 thanks

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      I think these days, either way you run the chance of setting off alerts. That is why some in the community feel that "Stealth" isn't the best name for the half open scan. Who knows, maybe that will get changed....

  • @wendy_113
    @wendy_113 Рік тому

    Many thanks

  • @romansovetskikh7902
    @romansovetskikh7902 Рік тому

    Very awesome and pretty informative. So, is it a good spot to block syn packets with 1024 win and no scaling factor on a web server? Can i block something suitable in this way?

    • @ChrisGreer
      @ChrisGreer  Рік тому +1

      If there are no options? Or only the MSS? I would say so - it’s a good signature for nmap and I have not seen too many real TCP stacks do that.

    • @romansovetskikh7902
      @romansovetskikh7902 Рік тому

      @@ChrisGreer I think both cases have no significant difference. I think if client just want to find a possibility to connect without real interaction it will not bring any "profit" to server. But "not seen too many" means "some of such exists"?

  • @S2eedGH
    @S2eedGH 2 роки тому

    IDK what to say, thanks s lot for these videos they really helps ... may I ask, Can I put a rule in IDS that catch Syn-Scan based on lack of TCP options and small size of "window"? also, can you please explain the best practice to hide yourself in a network as an Ethical Hacker (Pentester). thanks a gain

    • @ChrisGreer
      @ChrisGreer  2 роки тому +1

      Sure you could - that would be a way to catch this type of half-open, or "stealth" scan. Many IDS's can catch these types of scans these days, so you probably can find a rule or signature that can isolate it pretty easily. I'm still learning pentesting myself, so I'm not an expert by any means! But as a protocol analyst, we are looking for things that look "weird". So hiding traffic in normal looking flows is what I would do to try to stay under the radar. I'd check out someone like John Hammond for tips on how to best fly low!

    • @S2eedGH
      @S2eedGH 2 роки тому

      @@ChrisGreer that’s would be great when we see you with John talking about Networking Security and Stealthy

  • @alejandroparrello6493
    @alejandroparrello6493 2 роки тому +1

    Hi Chris!! Awesome video you are the man! 🙌😉
    I have a question, if nmap dosen't send rst, what would it happen?
    Regards from Argentina 😁🤙🤙

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Hey Alejandro! Qué onda amigo? Ok that is a great question. So basically since the server doesn't hear back, it will think that the SYN/ACK was lost and it will retransmit it a few times. To save the bother, we reset to let the endpoint know that we are abandoning the connection.

    • @alejandroparrello6493
      @alejandroparrello6493 2 роки тому

      @@ChrisGreer Jajaja hey!! you speak spanish too? ok ok, I got it now!
      I asked you about that 'cause you know, if the 3way handshake not conlude i think the host it still spend resoures. Is it?
      Sorry by my poor english, iworkin on it... hahaha!!

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      No problem, entiendo. Si! Yo viví en centro america durante unos años. Siempre estoy tratando practicar. Es fácil olvidar, como los "headers" sobre TCP! 😄

    • @alejandroparrello6493
      @alejandroparrello6493 2 роки тому

      @@ChrisGreer Hu genial profe! que alegría! jaja...
      I have a thousand questions to make! if you don't mind, can i email you? i want find some issue that i think i have on my office network.
      without obligation please!

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      @@alejandroparrello6493 sure! packetpioneer@gmail.com

  • @justindittburner216
    @justindittburner216 2 роки тому

    I'd really appreciate if you uploaded the Wireshark captures to follow along with

    • @ChrisGreer
      @ChrisGreer  2 роки тому

      Hi Justin, thanks for commenting! In many if not most of my videos I choose to share the pcap because it is really hard to reproduce. In this nmap one I chose not to since it is a much simpler pcap to generate.

  • @melltelae3557
    @melltelae3557 2 роки тому

    legit useful info here. keep it up

  • @jjames7206
    @jjames7206 2 роки тому

    Thanks Chris!!

  • @ThePumbaadk
    @ThePumbaadk 2 роки тому

    Tanks Chris

  • @jamesa4958
    @jamesa4958 2 роки тому

    A+. Thank you

  • @curias7
    @curias7 Рік тому

    How about steath scan vs tcp sync ping

  • @HuzaifaGujjar
    @HuzaifaGujjar 2 роки тому

    Superb

  • @dopy8418
    @dopy8418 2 роки тому

    So the -sT is the default if you don’t enter any -s

  • @dinieshvc8069
    @dinieshvc8069 2 роки тому

    nice in future need some real packet explanation

  • @aba-nascu
    @aba-nascu 2 роки тому

    NIce THX! :-)

  • @greob
    @greob 2 роки тому +2

    Very clear explanation, thank you!