What Is Network Security? | Introduction To Network Security | Network Security Tutorial|Simplilearn

Simplilearn
28 Jul 202223:55

Summary

TLDRThis video script delves into the critical realm of network security, outlining its definition, importance, and multi-layered approach. It introduces viewers to the concept, explains the processes of authentication and authorization, and highlights the significance of securing data in transit. The script covers various types of network security, including physical, technical, and administrative, and explores tools like firewalls, VPNs, and intrusion prevention systems. It also emphasizes the benefits of network security, such as protection against threats and increased productivity, and concludes with a practical demonstration of using Nmap for scanning and ethical hacking.

Takeaways

  • 🌐 The world relies heavily on data transmitted over networks, which can be vulnerable to security breaches if not properly secured.
  • 🛡️ Network security is essential for protecting the usability and integrity of a company's infrastructure from unauthorized access and cyber threats.
  • 🔒 Basic network security measures include password protection, which is crucial for both personal and professional networks.
  • 🏢 Large amounts of data handled by companies require robust security solutions to mitigate risks of data loss, theft, and sabotage.
  • 🔒 Network security infrastructure offers multiple levels of protection, including preventing man-in-the-middle attacks and ensuring data confidentiality and accessibility.
  • 🔑 Network security involves processes like authentication to verify user identity and authorization to determine access levels within the network.
  • 🔒 There are three main types of network security: physical, technical, and administrative, each addressing different aspects of security.
  • 🔒 Transport layer security, such as TLS, ensures a private and secure connection between a web browser and a server using cryptographic methods.
  • 🛡️ Application layer security is critical as it is the closest to the end user and protects against various attacks such as DDoS, SQL injections, and cross-site scripting.
  • 🧰 Key network security tools include firewalls, VPNs, intrusion prevention systems, and behavioral analytics to enforce security policies and detect threats.
  • 🛡️ Network security benefits include protection against external and internal threats, increased productivity by minimizing downtime, and maintaining brand trust and reputation.

Q & A

  • What is the primary concern when transmitting data over a network?

    -The primary concern is ensuring the security of the data during transit, as it is vulnerable to corruption and attacks from malicious hackers during this phase.

  • Why is network security becoming increasingly important?

    -Network security is becoming more important due to the rising amount of data being transmitted over networks, the complexity of network architecture, and the constant threat of cyber attacks.

  • What are the key components of network security infrastructure?

    -The key components include tools that protect the network itself and the applications running over it, employing multiple lines of defense that are scalable and automated.

  • What is the basic example of network security?

    -The most basic example of network security is password protection, which helps prevent unauthorized access to the network.

  • How does network security help in protecting against data loss, theft, and sabotage?

    -Network security helps by implementing strong security systems that safeguard the network and workstations from harmful attacks, ensuring the confidentiality and accessibility of data.

  • What are the two main processes involved in network security?

    -The two main processes are authentication, which verifies the identity of users, and authorization, which determines the level of access granted to authenticated users.

  • What are the three types of network security?

    -The three types of network security are physical security, which protects against unauthorized access to network devices; technical security, which safeguards data during storage and transmission; and administrative security, which manages user permissions and access control.

  • What is the purpose of the Transport Layer Security (TLS) in network security?

    -TLS is used to secure information as it is carried over the internet, providing a private and secure connection between a web browser and a website server using cryptographic handshakes.

  • What is the role of an Intrusion Prevention System (IPS) in network security?

    -An IPS actively scans the network for harmful activity and responds by reporting, blocking, or discarding the threats, offering a more proactive approach than Intrusion Detection Systems (IDS) which only identify threats.

  • What are some benefits of implementing network security measures?

    -Benefits include protection against external and internal threats, increased productivity by minimizing downtime and cyber attacks, and enhanced brand trust and reputation through a strong cybersecurity stance.

  • How can Nmap be used in network security for ethical hacking and penetration testing?

    -Nmap can identify active hosts, scan for open ports, guess the operating system of a target, detect service versions, and perform various types of scans to help security professionals assess and improve network security.

Outlines

00:00

🔒 Introduction to Network Security

This paragraph introduces the concept of network security, emphasizing its importance in protecting data during transmission over interconnected devices. It explains that network security involves a set of technologies aimed at preventing unauthorized access and ensuring the integrity of a company's infrastructure. The paragraph outlines the basic definition of network security, its working principles, and the multi-layered defense strategies employed. It also touches on the evolution of network security from a basic password protection to a central topic in cybersecurity, highlighting the need for skilled professionals in the field. The infrastructure's complexity and the constant threat environment are also discussed, indicating the necessity for robust security measures.

05:02

🛡️ Types of Network Security and Their Layers

This section delves into the different types of network security: physical, technical, and administrative. Physical security focuses on protecting data and network equipment from unauthorized access, often employing biometric systems and other access control measures. Technical security is concerned with safeguarding data in transit or at rest, defending against unauthorized users and malicious actions. Administrative security involves managing user permissions and the authorization process, ensuring compliance with security policies and suggesting infrastructure amendments when necessary. The paragraph also introduces transport and application layer security, discussing the role of TLS in establishing secure connections and the threats posed by poor application layer security, such as DDoS and XSS attacks.

10:04

🛠️ Key Network Security Tools and Their Functions

This paragraph discusses the essential tools used in network security, starting with firewalls, which filter network traffic based on security rules, and VPNs, which provide encrypted connections for secure data transmission. It also covers Intrusion Prevention Systems (IPS), which actively monitor and respond to malicious activities, in contrast to Intrusion Detection Systems (IDS) that only identify threats. Behavioral analytics is introduced as a tool for detecting patterns that may indicate an attack, enhancing security measures accordingly. The paragraph concludes by emphasizing the importance of these tools in managing and mitigating the various threats present in today's complex network architectures.

15:05

🛡️ Benefits of Network Security for Modern Challenges

The benefits of network security are highlighted in this paragraph, starting with protection against external threats such as cybercriminals and industrial spies. It underscores the importance of a strong cybersecurity posture to identify and respond to attacks. The paragraph also addresses the internal threats posed by human error or malicious insiders, emphasizing the need for proactive network monitoring and access management. Increased productivity is identified as a benefit, as cybersecurity measures minimize downtime and the impact of cyber attacks. Lastly, the paragraph discusses the impact of network security on brand trust and reputation, noting its importance for customer retention and business development.

20:06

🕵️‍♂️ Demonstrating Network Security with Nmap

This paragraph provides a practical demonstration of network security using Nmap, a tool for network exploration and security auditing. It begins with the installation of Nmap on various Linux distributions and proceeds to showcase its capabilities, such as identifying active hosts with a ping scan and conducting port scans to detect open ports and the services running on them. The paragraph also explains how Nmap can guess the operating system of a target host and detect service versions, which are crucial for identifying vulnerabilities. The demonstration includes commands and explanations on how to use Nmap for scanning specific ports, ranges of ports, and understanding the state of ports (open, filtered, or closed), illustrating the tool's utility in ethical hacking and security testing.

Mindmap

Keywords

💡Network Security

Network Security refers to a set of technologies and practices designed to protect the usability and integrity of a company's infrastructure. It is central to the video's theme, emphasizing the protection of data during transmission over interconnected devices. The script discusses network security strategies, tools, and the importance of securing networks against cyber threats, illustrating its significance through examples like password protection and the use of firewalls.

💡Data

Data, in the context of the video, represents the information ranging from shopping habits to financial transactions that traverse networks. It is the core element that network security aims to protect. The script mentions that data security is paramount during transit, highlighting the potential risks of corrupted data and the necessity of secure networks to safeguard it.

💡Authentication

Authentication is a process in network security that verifies the identity of users attempting to access a network. It is a fundamental concept in the video, ensuring that only authorized individuals can enter the network. The script explains that it is similar to access paths in a building, preventing unauthorized intrusions by checking the identity of users.

💡Authorization

Authorization determines the level of access granted to authenticated users within a network. It is a key concept in the video, distinguishing between the roles of different users, such as network admins who require full access versus others who might only need access to certain areas. The script uses the example of a network admin to illustrate how authorization works in practice.

💡Firewall

A Firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. The video discusses firewalls as the first line of defense in network security, providing a barrier between internal networks and external threats like the internet. The script also describes how firewalls operate to protect against unauthorized access.

💡Virtual Private Network (VPN)

A Virtual Private Network, or VPN, is highlighted in the video as a tool for creating an encrypted connection between a device and a network over the internet. It ensures secure transmission of sensitive data, preventing eavesdropping and enabling remote work. The script explains the importance of VPNs in both corporate and personal networks for enhancing security.

💡Intrusion Prevention System (IPS)

An Intrusion Prevention System is a network security tool that actively scans for and responds to harmful activity on a network. The video positions IPS as a more advanced version of Intrusion Detection Systems (IDS), with the capability to take action against threats by blocking or discarding them. The script illustrates the proactive nature of IPS in network security.

💡Behavioral Analytics

Behavioral Analytics is a technique used in network security that focuses on analyzing patterns in network traffic and usage over time. The video script mentions it as a tool for detecting potential attacks by identifying unusual patterns that deviate from normal network behavior, thereby enhancing security measures.

💡Transport Layer Security (TLS)

Transport Layer Security, or TLS, is a cryptographic protocol mentioned in the video for securing internet communications. It establishes a secure connection between a web browser and a server, protecting data in transit with public key cryptography. The script explains the role of TLS in providing privacy and security for online activities such as browsing and instant messaging.

💡Application Layer

The Application Layer is the topmost layer of the network protocol stack and is closest to the end user. In the context of the video, it is highlighted as a critical area for network security due to the large threat surface it presents to hackers. The script discusses the importance of securing the application layer against attacks like DDoS, SQL injections, and cross-site scripting.

💡Nmap

Nmap, or Network Mapper, is a prominent tool featured in the video for scanning networks and is used for ethical hacking and security testing. The script provides a live demonstration of using Nmap to identify active hosts, scan ports, guess the operating system of a target, and detect service versions, illustrating its practical applications in network security assessments.

Highlights

The world's reliance on data and the importance of securing it during transmission.

The role of network security in protecting the usability and integrity of a company's infrastructure.

Network security strategies involving multiple layers of defense that are scalable and automated.

The basic example of network security: password protection.

The centrality of network security in cybersecurity and its increasing importance.

The vulnerability of wireless routers and the necessity of securing them against attacks.

The function of network security in protecting workstations from harmful spyware.

The concept of dividing and encrypting information to secure data sharing over a network.

The challenges of securing network traffic and infrastructure in a hyper-connected environment.

Authentication and authorization as key processes in network security.

The three types of network security: physical, technical, and administrative.

The importance of transport layer security (TLS) in establishing a secure connection over the internet.

The risks associated with poor application layer security and the potential attacks it can invite.

The use of firewalls as the first line of defense in network security.

The role of VPNs in providing secure, encrypted connections for remote work.

The function of intrusion prevention systems (IPS) in detecting and responding to harmful network activity.

The significance of behavioral analytics in detecting patterns that may indicate security threats.

The benefits of network security, including protection against external and internal threats.

The impact of network security on increasing productivity and minimizing downtime.

The role of network security in building brand trust and reputation.

A practical demonstration of using Nmap for network scanning and security testing.

Transcripts

play00:10

the world runs on data off

play00:12

the internet houses are treasured loop

play00:14

of potentially harmful information from

play00:16

basic shopping habits to private

play00:18

financial transactions

play00:20

all this data is carried over a network

play00:22

of interconnected devices

play00:25

during transit the data is as secure as

play00:27

the mechanism responsible for its

play00:29

transmission it's in this phase that the

play00:31

most corrupted data originates

play00:33

it's paramount that the networks

play00:35

carrying this data must be secured

play00:37

against malicious hackers and ample

play00:39

attacks

play00:41

let's take a look at the topics to be

play00:43

covered in this video on network

play00:44

security which is rising in popularity

play00:47

and importance

play00:48

we start by introducing the viewers to

play00:50

network security and its basic

play00:52

definition

play00:53

we cover the working of network security

play00:56

in the next section

play00:57

then we have the different types of

play00:58

network security followed by a small

play01:00

introduction to transport and

play01:02

application layer security and the

play01:04

importance

play01:05

next we cover the key tools in network

play01:08

security the benefits and a live

play01:10

demonstration of how nmap can scan posts

play01:13

and aid in ethical hacking

play01:16

so let's start with the first topic for

play01:17

the day which is an introduction to

play01:19

network security

play01:21

network security is a set of

play01:23

technologies that protects the usability

play01:25

and integrity of a company's

play01:27

infrastructure by preventing the entry

play01:29

or proliferation within a network

play01:32

it architecture comprises of tools that

play01:34

protect the network itself and the

play01:36

applications that run over it

play01:38

effective network security strategies

play01:40

employ multiple lines of defense that

play01:42

are scalable and automated each

play01:44

defensive layer here enforces a set of

play01:47

security policies which are determined

play01:48

by the administrator beforehand

play01:51

this aims at securing the

play01:52

confidentiality and accessibility of the

play01:55

data and the network

play01:57

the every company or organization that

play01:58

handles a large amount of data has a

play02:00

degree of solutions against many cyber

play02:02

threats the most basic example of

play02:04

network security is password protection

play02:07

it has the network the user chooses

play02:10

recently network security has become the

play02:11

central topic of cyber security with

play02:14

many organizations involving

play02:15

applications from people with skills in

play02:17

this area it is crucial for both

play02:19

personal and professional networks most

play02:22

houses with high speed internet have one

play02:24

or more wireless routers which can be

play02:26

vulnerable to attacks if they are not

play02:27

adequately secured

play02:30

data loss theft and sabotage risk may be

play02:33

decreased with the usage of a strong

play02:35

network security system

play02:37

the workstations are protected from

play02:39

hazardous spyware thanks to network

play02:41

security

play02:42

additionally it guarantees the security

play02:44

of the data which is being shared over a

play02:46

network

play02:47

by dividing information into various

play02:48

sections encrypting these portions and

play02:51

transferring them over separate pathways

play02:53

network security infrastructure offers

play02:55

multiple levels of protection to thought

play02:58

man in the middle attacks preventing

play02:59

situations like eavesdropping among

play03:01

other harmful attacks

play03:03

it is becoming increasingly difficult in

play03:05

today's hyper-connected environment as

play03:07

more corporate applications migrate to

play03:09

both public and private clouds

play03:11

additionally modern applications are

play03:13

also frequently virtualized and

play03:15

dispersed across several locations some

play03:17

outside the physical control of the itd

play03:21

network traffic and infrastructure must

play03:22

be protected in these cases since

play03:24

assaults on businesses are increasing

play03:26

every single day

play03:28

we now understood the basics of network

play03:30

security but we need to understand how

play03:32

network security works in the next

play03:34

section in slightly more detail

play03:37

network security revolves around two

play03:39

processes authentication and

play03:41

authorization

play03:43

the first process which is

play03:44

authentication is similar to access

play03:46

paths which ensure that only those have

play03:48

the right to enter a building

play03:50

in other words authentication checks and

play03:52

verifies that it is indeed the user

play03:55

belonging to the network who is trying

play03:57

to access or enter it thereby preventing

play03:59

unauthorized intrusions

play04:01

next comes authorization

play04:04

this process decides the level of access

play04:06

provided to the recently authenticated

play04:08

user

play04:10

for example

play04:11

network admin needs access to the entire

play04:13

network whereas those working within it

play04:15

probably need access to only certain

play04:17

areas within the network

play04:19

based on the network user's role the

play04:21

process of determining the level of

play04:23

access or permission level is known as

play04:25

authorization

play04:26

today's network architecture is complex

play04:28

and faces a threat environment that is

play04:31

always changing and attackers that are

play04:32

always trying to find and exploit

play04:34

vulnerabilities

play04:36

these vulnerabilities can exist in many

play04:37

areas including devices data

play04:40

applications users and locations

play04:44

for this reason many network security

play04:46

management tools and applications are in

play04:48

use today that address individual

play04:50

threats

play04:52

when just a few minutes of down times

play04:54

can cause widespread disruption and

play04:55

massive damage to an organization's

play04:57

bottom line and reputation it is

play04:59

essential that these protection measures

play05:01

are in place beforehand

play05:04

now that we know a little about network

play05:05

security and it's working let's cover

play05:08

the different types of network security

play05:11

the fundamental tenet of network

play05:12

security is the layering protection for

play05:14

massive networks and stored data that

play05:17

ensure the acceptance of rules and

play05:18

regulations

play05:20

as a whole there are three types

play05:22

the first of which is physical security

play05:24

the next being technical and the third

play05:26

being administrative

play05:29

let's look into physical security first

play05:31

this is the most basic level that

play05:33

includes protecting data and network

play05:35

through unauthorized personnel from

play05:37

acquiring control over the

play05:38

confidentiality of the network these

play05:40

include external peripherals and routers

play05:43

that might be used for cable connections

play05:45

the same can be achieved by using

play05:46

devices like biometric systems

play05:49

physical security is critical especially

play05:51

for small businesses that do not have

play05:53

many resources to devote to security

play05:55

personnel and the tools as opposed to

play05:57

large firms

play05:59

when it comes to technical network

play06:00

security it focuses mostly on

play06:03

safeguarding data either kept in the

play06:04

network or engaged in network

play06:06

transitions

play06:08

this kind fulfills two functions

play06:10

one is depends against unauthorized

play06:12

users

play06:13

the other is a defense against

play06:14

malevolent actions

play06:16

the last category is administrative

play06:19

this level of network security protects

play06:21

user behavior like how the permission

play06:23

has been granted and how the

play06:25

authorization process takes place

play06:27

this also ensures the level of

play06:29

sophistication the network might need to

play06:30

protect it through all the attacks

play06:33

this level also suggests necessary

play06:35

amendments that have to be done to the

play06:37

infrastructure

play06:38

i think that's all the basics that we

play06:40

need to cover on network security

play06:42

in which our next topic we're going to

play06:43

go through two mediums of network

play06:45

security which are the transport layer

play06:47

and the application layer

play06:50

the transport layer is a way to secure

play06:52

information as it is carried over the

play06:54

internet with users browsing websites

play06:56

emails instant messaging etc

play06:59

tls aims to provide a private and secure

play07:02

connection between a web browser and a

play07:04

website server it does this with a

play07:06

cryptographic handshake between two

play07:08

systems using public key cryptography

play07:11

the two parties through the connection

play07:12

exchange a secret token and once each

play07:14

machine validates this token it is used

play07:16

for all communications

play07:18

the connection employs lighter symmetric

play07:20

cryptography to save bandwidth and

play07:22

processing power

play07:24

since the application layer is the

play07:26

closest layer to the end user it

play07:28

provides hackers with the largest threat

play07:30

surface

play07:31

poor app layer security can lead to

play07:33

performance and stability issues data

play07:35

theft and in some cases the network

play07:37

being taken down

play07:38

examples of application layer attacks

play07:40

include distributed denial of service

play07:42

attacks or tdos attacks http flats hp

play07:46

injections cross-site scripting etc

play07:50

most organizations have an arsenal of

play07:51

application layer security protections

play07:53

to combat these and more such as web

play07:56

application firewalls secure web gateway

play07:58

services etc

play08:01

now that we have the theory behind

play08:02

network security has been covered in

play08:04

detail let us go through some of the

play08:06

tools that can be used to enforce these

play08:08

network security policies

play08:11

the first two to be covered in the

play08:13

section is a firework

play08:15

a firewall is a type of network security

play08:17

device that keeps track of incoming and

play08:19

outgoing network traffic and it decides

play08:22

which traffic to allow or deny in

play08:24

accordance to a set of security rules

play08:27

for more than 25 years firewalls have

play08:29

served a network security's first line

play08:31

of defense

play08:32

they provide a barrier between

play08:34

trustworthy internal protected and

play08:36

regulated networks from shady external

play08:38

networks like the internet at some point

play08:41

the next tool which can be used to

play08:43

bolster network security is a virtual

play08:45

private network or vpn for short

play08:48

it's an encrypted connection between a

play08:49

device and a network via the internet

play08:52

the encryptment connection is the secure

play08:55

transmission of sensitive data

play08:57

it makes it impossible for unauthorized

play08:59

parties to eavesdrop on the traffic and

play09:01

enables remote work for the user

play09:03

the usage of vpn technology is common in

play09:05

both corporate and personal networks

play09:08

next we cover the importance of

play09:09

inclusion prevention systems in network

play09:11

security or ips frameworks

play09:15

an intrusion prevention system is a

play09:16

network security tool that continually

play09:19

scans the network for harmful activity

play09:21

and responds to it when it does occur by

play09:24

reporting blocking or discarding it

play09:27

it can be either hardware or software

play09:29

it's more sophisticated than an

play09:30

inclusion detection system or an ids

play09:33

framework which can just warn an

play09:34

administrator and merely identify

play09:36

harmful activities while in the case of

play09:38

an ips it actually takes against that

play09:40

activity

play09:42

the next tool in this section and final

play09:43

one are going to be behavioral analytics

play09:46

behavior analytics focus more on the

play09:48

statistics that are being carried over

play09:50

and stored through months and years of

play09:52

usage

play09:53

when some kind of similar pattern is

play09:55

noted that the idea administrator can

play09:57

detect some kind of attack the similar

play09:59

attacks can be stopped and the security

play10:01

can be further enhanced

play10:03

another day i've covered all that we

play10:04

need to know about network security the

play10:06

necessary tools it's different types etc

play10:09

let's go through the benefits of network

play10:11

security as a whole

play10:14

the first which is protection against

play10:16

external threats

play10:17

the objective for cyber assaults can be

play10:19

as varied as the defenders themselves

play10:22

although they are typically initiated

play10:23

for financial gain whether they are

play10:25

industrial spies hacktivists or cyber

play10:28

criminals these bad actors all have one

play10:30

thing in common which is how quick

play10:32

clever and covert the attacks are

play10:34

getting a strong cyber security posture

play10:36

that considers routine software updates

play10:39

may assist firms in identifying and

play10:41

responding to the abuse techniques tools

play10:44

and the common entry points

play10:46

the next benefit is protection against

play10:48

internal threats the human aspect

play10:51

continues to be the cyber security

play10:52

system's weakest link

play10:54

insider risk can originate from current

play10:56

or former workers third party vendors or

play10:59

even trusted partners and they can be

play11:00

unintentional careless or downright evil

play11:04

aside from that the rapid expansion of

play11:06

remote work and the personal devices

play11:08

used for business purposes while even

play11:10

iot devices in remote locations can make

play11:13

it easier for these kind of threats to

play11:14

go undetected until it's too late

play11:17

however by proactively monitoring

play11:19

networks and managing access these

play11:21

dangers may be identified and dealt with

play11:24

before they become expensive disasters

play11:27

the third benefit is increased

play11:28

productivity

play11:30

it is nearly impossible for employees to

play11:32

function when network and personal

play11:34

devices are slowed to a crawl by viruses

play11:36

and other cyber attacks during the

play11:38

operation of website and for the company

play11:40

to run

play11:41

you must significantly minimize

play11:42

violations and the amount of downtime

play11:44

required to fix the breach by

play11:46

implementing various cybersecurity

play11:48

measures such as enhanced firewalls

play11:50

wireless scanning and automatic backups

play11:53

employee identification of possible

play11:55

email phishing schemes suspicious links

play11:58

and other malicious criminal activities

play12:00

can also be aided by education and

play12:02

training

play12:04

another benefit is

play12:05

brand trust and reputation

play12:08

customer retention is one of the most

play12:09

crucial elements in business development

play12:12

customers today place a premium on

play12:14

maintaining brand loyalty through a

play12:15

strong cyber security stance since this

play12:18

is the fastest way to get other

play12:19

businesses back get referrals and sell

play12:22

more tickets overall additionally it

play12:24

helps manufacturers get on the vendor

play12:26

list with bigger companies as a part of

play12:28

the supply chain which is only as strong

play12:30

as its weakest link

play12:32

this opens possibilities for potential

play12:34

future endeavors and development

play12:37

it's all really the all for the

play12:38

theoretical part of network security

play12:41

after covering so many topics let's go

play12:43

through a small demonstration to drive

play12:44

home this topic's importance so one of

play12:46

the first things we're going to cover is

play12:48

the installation of nmap

play12:50

what are we using right now is actually

play12:52

vmware a re-running an instance of a

play12:55

relax distribution known as parrot

play12:57

security operating system

play12:59

the parrot security os is a debian based

play13:01

linux distribution that is catered more

play13:03

towards ethical hackers and penetration

play13:05

testers the howard is created more is it

play13:08

comes pre-installed with a lot of tools

play13:10

that ethical hackers need including nmap

play13:13

so let's say you're using another debian

play13:15

based linux distribution

play13:17

if you want to install nmap you can go

play13:19

with the command of sudo

play13:21

apt which is the package manager

play13:24

install

play13:25

and

play13:26

and just press enter

play13:28

at this point it's going to ask you for

play13:30

your administrator password because of

play13:31

the sudo command which you have used now

play13:33

this epd will change depending on the

play13:35

distribution let's say using a

play13:37

distribution that is based on arch linux

play13:39

that will be different if there is some

play13:41

other distribution which is built from

play13:43

scratch the commands will differ but

play13:45

more or less a lot of the distributions

play13:47

the main stream distributions that

play13:49

people use like ubuntu zorinos max mint

play13:52

they are debian bs so you're just going

play13:54

to be using sudo apt install and map

play13:57

if you give your administrator password

play13:59

here

play14:00

it's going to see that nmap is

play14:03

smashed manually installed and it is

play14:05

already the newest version at this point

play14:07

if you do not have an app in your

play14:08

distribution it's going to install the

play14:10

necessary package files

play14:13

if i just use the nmap command you can

play14:15

see some help lines where it basically

play14:18

says what kind of flags you can use what

play14:19

are some of the most common commands the

play14:21

version etc it gives a small sample for

play14:25

the usage of nmap

play14:27

now

play14:28

the first one of the most basic

play14:30

functions of nmap is to identify active

play14:33

hosts on your network

play14:35

and app does this by using a ping scan

play14:37

or sometimes it's called a ping suite

play14:39

this identifies all of the ip addresses

play14:41

that are currently online without

play14:43

sending any packets to these hosts

play14:46

to run the command we're just going to

play14:48

go with let me just clear the screen for

play14:50

now

play14:53

another thing you have to do before

play14:54

running nmap just for our ease of use is

play14:57

we're going to use the sudo suv command

play15:00

this will turn our console into an

play15:02

administrator console so let's say we

play15:04

want to use some drivers or some

play15:06

external adapters or anything that

play15:08

requires administrative permission we

play15:09

don't have to use the admin password

play15:11

again and again

play15:15

just going to give it a bit of time for

play15:17

it to recognize

play15:25

okay now that you see uh this dollar

play15:27

sign has changed into a hash symbol

play15:30

which means we now have root access

play15:32

of this console right now of this

play15:34

terminal so what we're going to do for

play15:36

the pink suite where we have to check

play15:37

existing course is are going to use the

play15:39

command in map

play15:41

minus sp

play15:46

and go with the ip address

play15:50

of the current subnet that you are in

play15:52

which is always going to be minus one uh

play15:54

it's always going to be 192 and 168.1.1

play15:59

the 24 bracket

play16:01

so this is going to take some time

play16:02

considering this is going to check all

play16:03

the hosts

play16:05

in this particular subnet

play16:08

the command then returns a list of posts

play16:10

on your network which is this and the

play16:12

total number of assigned ip addresses if

play16:15

you can spot like any ip addresses that

play16:17

you cannot account for in your network

play16:19

or your server you can then add further

play16:21

commands to investigate them further

play16:22

using nmap itself

play16:25

now coming to another feature of nmap

play16:28

which is a very important usage

play16:30

is

play16:30

when scanning posts and mac commands can

play16:33

use server names ip addresses or even

play16:35

ip6 addresses

play16:37

a basic nmap command will produce

play16:39

information about the given host

play16:42

so to run a basic port scan we can just

play16:43

use the nmap command with the ip address

play16:45

of the device or the ip address that we

play16:48

are targeting

play16:49

so for now the host machine that i am

play16:51

using currently has this current ip

play16:54

address

play16:55

if you can see the current id address is

play16:58

192.168.1.22

play17:02

as it's written in the ipv4 address

play17:03

preferred section

play17:05

so now we're going to try and attack

play17:07

this first machine using nmap on parent

play17:09

security operating system

play17:11

so we're just going to go with the end

play17:13

map

play17:14

192 162

play17:18

and press enter and it's going to start

play17:20

scanning the host for different services

play17:23

and the ap address

play17:24

that are being run on the system

play17:29

the speed of these scans usually depends

play17:31

on how quick the processor is and also

play17:33

how quickly the two machines can connect

play17:35

with each other but two machines i mean

play17:38

the virtual machine in this case and the

play17:40

machine that is being attacked which is

play17:42

right now the host machine which is

play17:44

running vmware workstation

play17:52

as you can see the core scanning is

play17:54

complete for this particular ip address

play17:56

and you can see the number of ports is

play17:58

mentioned and the services that these

play18:00

posts are used for is also mentioned it

play18:03

says which of these are open for example

play18:05

the 53 tcp port we can see it is closed

play18:08

while some of the other ports are open

play18:11

now one more feature of nmap is the

play18:13

ability to guess the operating system of

play18:15

the ip address that we are attacking

play18:17

for that we need to add one more flag

play18:20

which is going to go with the normal

play18:21

command is n map minus 4 and

play18:25

the regular appearance that we are in

play18:28

the process of attacking

play18:30

let's give it a few minutes to run the

play18:32

scan and it will try and put a small gas

play18:34

on the operating system that this host

play18:36

might be running

play18:38

this gas might not always be accurate

play18:40

but it puts a small idea and this is

play18:43

much more accurate in the case of

play18:44

actually unix based operating system

play18:46

other than windows based operating

play18:48

systems may be able to detect that if it

play18:50

is a windows a linux macintosh

play18:53

and so on

play18:55

but it may have difficulty finding exact

play18:57

single versions which becomes easier in

play18:59

the case of linux because we can

play19:01

identify different distributions by some

play19:03

of the kernels

play19:04

which and most of the vulnerabilities

play19:06

comes from the kernels and not the

play19:08

particular distributions

play19:13

as you can see the os detection guess is

play19:15

complete and you can see aggressive os

play19:17

is over here which is microsoft windows

play19:19

xp service pack or windows server and

play19:22

there's the 98 guess that it's mostly

play19:26

like i mentioned if you can guess if it

play19:28

is a windows based system you can apply

play19:30

the vulnerabilities and exploits

play19:32

accordingly

play19:33

now at times you may need to detect

play19:35

service version and the and similar

play19:38

information from these open ports

play19:40

actually this is useful for

play19:41

troubleshooting and scanning for

play19:43

vulnerabilities or locating services

play19:45

that need to be updated considering a

play19:47

lot of the new updates are used to fix

play19:50

these kind of open vulnerabilities so

play19:53

the flag that we're going to use in this

play19:55

case is minus

play19:57

sv or hyphen s3 so only this is going to

play20:00

change with the nmap and the ip address

play20:02

of the whole system staying consistent

play20:04

a lot of the services that are being run

play20:06

on these ports are often not the most

play20:08

safe for example apache web server which

play20:10

is a very common web server being used

play20:12

for even local and global projects uh a

play20:15

lot of the older versions used to have

play20:17

systems that can allow privilege

play20:18

escalations or other vulnerabilities

play20:21

that can allow hacker to get into your

play20:23

system without even you getting a trace

play20:25

of it

play20:26

silhouetted versions tend to fix these

play20:28

as quickly as possible and most of these

play20:30

versions do not circulate in the real

play20:32

world but can be used for ethical

play20:34

hacking and testing on how these

play20:36

validate and how these vulnerabilities

play20:38

can be attacked further

play20:45

now with the sv command scan is complete

play20:48

we can see that it is mentioning some of

play20:50

the version of the services that are

play20:52

being run on the particular post

play20:54

once again like i mentioned using these

play20:56

version numbers you can identify

play20:58

particular vulnerabilities and use the

play21:00

exploits design for these

play21:01

vulnerabilities to gain access to the

play21:03

system

play21:04

another thing that nmap does well is

play21:07

port scanning it's now the basic

play21:08

utilities actually that nmap offers and

play21:11

consequently there are few ways that

play21:13

this command can be customized further

play21:15

for example to come to start a port scan

play21:18

we're going to use the flag of my ipin p

play21:21

we're going to specify a random port for

play21:24

example 443 which we know it will be

play21:26

open because it is the port used for

play21:28

https connections which is obviously

play21:30

essential for you to access the internet

play21:32

and once again we are going to use the

play21:34

ip address or local host

play21:37

as the test machine that have been

play21:39

attacked

play21:41

as you can see it clearly states that

play21:42

the four fourth report is open as

play21:45

expected

play21:46

now you can use multiple ports you can

play21:48

check multiple ports this way for

play21:49

example and map and p we're going to use

play21:52

scan three different ports four four

play21:54

three eighty and four four five

play21:59

address again

play22:02

and it's going to show

play22:04

the state of all the three ports now you

play22:05

can see this filter part here

play22:08

which which does not mean it is open and

play22:10

it cannot be exploited in any way at

play22:11

least right now maybe there is any other

play22:14

service that is being run it can be

play22:16

exploited further but right now it is in

play22:18

a filtered condition

play22:19

that is how we can actually scan for

play22:21

multiple ports together we can also we

play22:24

can also use actually in a sports car in

play22:27

a range format for example

play22:29

let's say we're going to scan the ports

play22:31

from 200

play22:32

to 300 and once again going to use the

play22:35

hyphen key flag

play22:38

then the ip address of the system being

play22:42

attacked

play22:44

it's going to scan all the posts from

play22:45

200 to 300 and mention what are the

play22:47

ports that are open filtered or just

play22:50

straight up closed

play22:52

as you can see all the 101 stand posts

play22:55

are in ignore state for example if we

play22:58

try to scan a range in

play23:00

a more reasonable range for example uh 4

play23:03

4

play23:04

3 2

play23:06

4 6

play23:07

that's it

play23:08

we'll keep the ip address similar

play23:14

and you can see two of them are open and

play23:16

two of them are filtered for different

play23:18

different reasons this is how you can

play23:20

find out which of the ports are liable

play23:23

for exploitation before attacking these

play23:25

kind of devices

play23:27

hope you enjoy this video

play23:29

please let us know in the comments

play23:30

section if you have any issues with

play23:31

network security or the things that you

play23:33

learned in this video subscribe to our

play23:35

channel for more videos like this and

play23:37

thank you for watching

play23:41

[Music]

play23:44

hi there if you like this video

play23:45

subscribe to the simply learn youtube

play23:47

channel and click here to watch similar

play23:50

videos to nerd up and get certified

play23:52

click here

Rate This

5.0 / 5 (0 votes)

Related Tags
Network SecurityData ProtectionCyber ThreatsEthical HackingInternet SafetySecurity ProtocolsVPN TechnologyFirewallsIntrusion DetectionOS Fingerprinting