WEBVTT

00:00.090 --> 00:02.360
Welcome to this section, guys.

00:02.370 --> 00:07.620
In this section, we are going to learn how to use the animal.

00:08.040 --> 00:15.210
We will be analyzing animal scan result with Wireshark and a separate section.

00:15.510 --> 00:23.750
So before we get there, I want to make sure that you learn the map first.

00:23.850 --> 00:29.670
Then you will be able to follow along the analysis section easily.

00:29.670 --> 00:38.040
In this section, you will learn the different aspects of a map, how to use it effectively to scan

00:38.040 --> 00:39.300
the networks.

00:39.540 --> 00:44.400
Alright, you might be wondering what is in an map, why it is important.

00:44.730 --> 00:51.900
Let me tell you guys, it does not matter whether you are a network engineer, cybersecurity engineer

00:51.900 --> 00:54.060
or an ethical hacker.

00:54.060 --> 00:59.880
And the map is one tool that you need to learn in general.

00:59.880 --> 01:09.840
And a map is an advanced information gathering tool that hackers use to gain the information about the

01:09.840 --> 01:16.080
systems that they want to hack in order to hack a system.

01:16.080 --> 01:25.680
Hackers look for openings or possible access points for infiltration where they can enter from, and

01:25.680 --> 01:30.810
any map provides those openings quite easily and masterfully.

01:30.810 --> 01:38.190
And the MAP scans for the open ports and different services that are running on a system.

01:38.190 --> 01:47.280
After identifying the services and open ports, then attackers can launch attacks and a map is a network

01:47.280 --> 01:57.480
scanning tool, and a map can scan an entire network or an individual device for open ports services

01:57.480 --> 02:00.000
operating system of a device.

02:00.000 --> 02:04.800
And it even exploits well known vulnerabilities.

02:07.550 --> 02:16.730
You should run board scans consistently to identify and close all the possible vulnerabilities that

02:16.730 --> 02:18.800
hackers might exploit.

02:18.860 --> 02:28.340
Regular port scanning is a good habit that you should repeat on a regular schedule if you are a network

02:28.340 --> 02:29.280
administrator.

02:29.300 --> 02:39.650
Also, review and audit all the open ports to verify whether they are being used correctly or not.

02:39.650 --> 02:49.120
And any applications that do use open ports are secure and protected from known vulnerabilities.
