network mapping using the address resolution protocol (arp)

BlueMonkey 4n6
BlueMonkey 4n6
2 هزار بار بازدید - 2 سال پیش - CAINE - 16 - arp,
CAINE - 16 - arp, arp-scan, arp-fingerprint, netdiscover

♥️ SUBSCRIBE for more videos: https://www.youtube.com/bluemonkey4n6...


Difficulty Level: beginner
Prerequisites: basic understanding of linux command line
  basic understanding of networking

In this video, we will look at using the arp and arp-scan tools to map out a network.


Video timeline
00:00     intro
00:43     arp
01:54     arp -n (numeric)
02:16     tcpdump to monitor network for effect of ping command on arp
03:17     outbound ping
04:31     inbound ping
05:45     ping to machine whose firewall blocks pings
06:44     ping to unused IP address
07:54     arp-scan
12:01     arp-fingerprint
13:40     arp-fingerprint -l
15:08     netdiscover - setup by re-assigning IP
17:20     netdiscover -p (passive)
19:22     netdiscover -r (range)
20:40     netdiscover -l (reads file with list of IP ranges)
21:54     netdiscover -P (Produce output)


⭕️ For other videos about the Linux command line, see other videos in this series: Linux Command Line tutorial

⭕️ To learn more about networking, see other videos in this series: Networking

Linux distro:
CAINE  linux (http://www.caine-live.net)

Virtualization software:
Virtual Box (http://virtualbox.org)

Download arp-scan from https://github.com/royhills/arp-scan
Download arp-fingerprint from https://command-not-found.com/arp-fin...
Download netdiscover from https://sourceforge.net/projects/netd...



%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Folks: these tools should only be used on networks that you own or have explicit consent to be on.  “hacking” networks can land you in some very unpleasant places controlled by very scary people.  I’ve been to countries where the Law Enforcement folks have told me some cautionary tales
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%


Icons made by freepik from @flaticon http://www.flaticon.com/authors/freepik

Icons made by Smashicons from  ttp://www.flaticon.com/authors/smashicons

This course was designed to provide information on how to use the command line environment in a Unix/Linux system to accomplish tasks such as imaging, data acquisition, and archiving.  This course covers the basics of Unix/Linux commands that allow users to view and edit text files, obtain hardware and system information, partitioning and formatting, process related commands, manipulating disks and partitions, imaging, archiving, logical acquisition, live system response, and basic networking.

This would be beneficial for folks who are interested in digital forensics, incidence response, system administration, ethical hacking, or just plain linux.  his course covers material for beginners as well as for advanced users. This course would also be helpful if you are considering taking the CompTIA Linux+ certification test.


#arp #networking #DFIR
2 سال پیش در تاریخ 1400/12/22 منتشر شده است.
2,042 بـار بازدید شده
... بیشتر