1 00:00:00,470 --> 00:00:06,410 ‫As I mentioned before, and Map Network Mapper is a free and open source utility for network discovery 2 00:00:06,410 --> 00:00:07,490 ‫and security auditing. 3 00:00:08,710 --> 00:00:14,770 ‫Many systems and network administrators also find it useful for tasks such as network inventory, managing 4 00:00:14,770 --> 00:00:19,030 ‫service, upgrade schedules and monitoring host or service uptime. 5 00:00:20,560 --> 00:00:24,070 ‫So let's analyze analyst Yes, an MP service of a router using an map. 6 00:00:26,700 --> 00:00:32,850 ‫So remember, in the previous lecture, we scanned the TCP port and we saw that the port TCP one six 7 00:00:32,850 --> 00:00:40,170 ‫one was closed, but we enable the SNP service in the router with a default values, so it's supposed 8 00:00:40,170 --> 00:00:40,710 ‫to be open. 9 00:00:41,900 --> 00:00:44,910 ‫As an MP uses the UDP protocol in general. 10 00:00:45,590 --> 00:00:49,460 ‫So we should check the Port UDP one six one as well. 11 00:00:50,150 --> 00:00:52,460 ‫So let's create another in map query. 12 00:00:54,440 --> 00:00:59,690 ‫This time around, we'll use as capital new to run a UDP scan. 13 00:01:01,000 --> 00:01:05,110 ‫Identify the port scanned by P as a parameter. 14 00:01:05,380 --> 00:01:08,290 ‫One, six, one and one six two. 15 00:01:09,660 --> 00:01:14,160 ‫S Capital V for version detection and finally, the IP address of our router. 16 00:01:15,490 --> 00:01:20,200 ‫Great UDP scans take a little longer than TCP scans and general. 17 00:01:33,200 --> 00:01:34,610 ‫So it took about two minutes. 18 00:01:34,940 --> 00:01:41,630 ‫And here are the results both UDP port one six one one six two are open as expected. 19 00:01:43,890 --> 00:01:50,220 ‫Now in Map has a scripting engine and has a lot of useful scripts that come with the end map tool by 20 00:01:50,220 --> 00:01:54,960 ‫default, the extension of map scripts is Dot Nrsi. 21 00:01:55,410 --> 00:02:02,250 ‫So let's find a few using the Locate Linux Command, Locate Star Dot NSC. 22 00:02:04,080 --> 00:02:05,910 ‫Here are the map scripts. 23 00:02:07,610 --> 00:02:12,080 ‫Now I want to filter the scripts written for just the S&P service. 24 00:02:12,740 --> 00:02:18,050 ‫Recall the command, but a pipe type grip as an MP and hit enter. 25 00:02:18,980 --> 00:02:23,390 ‫It'll show only the lines which contain as an MP as the key word. 26 00:02:24,470 --> 00:02:30,470 ‫The S&P Bruit script is defined the community names of the service using the brute force attack. 27 00:02:30,980 --> 00:02:34,670 ‫So let's create a new and map query to run this script. 28 00:02:35,960 --> 00:02:45,170 ‫And map as upper case you to scan UDP ports p one six one to scan the port one six one IP address of 29 00:02:45,170 --> 00:02:51,530 ‫the router script to run the script, and finally, the name of the script as an MP. 30 00:02:51,660 --> 00:02:52,220 ‫Beirut. 31 00:02:57,150 --> 00:03:03,840 ‫And here's the result and Map found two community names public and private. 32 00:03:04,620 --> 00:03:05,520 ‫That's just perfect.