00:00:00
hey everyone welcome back to another
00:00:01
video here on tryhackme
00:00:03
today we're going to be taking a look at
00:00:04
the room what is networking
00:00:06
begin learning the fundamentals of
00:00:08
computer networking in this
00:00:10
bite size and interactive module this is
00:00:12
a really cool module this is uh
00:00:14
i believe had some new technology
00:00:16
introduced into it by our developers
00:00:18
very excited to go through this and it
00:00:20
should be a nice one
00:00:21
let's go ahead and dive into task one
00:00:23
what is networking
00:00:26
networks are simply things connected for
00:00:29
example
00:00:30
your friendship circle you are all
00:00:31
connected because of similar interests
00:00:33
hobbies skills and uh different sorts of
00:00:36
things
00:00:37
and this is sort of where the term
00:00:38
networking comes from if you are doing
00:00:40
job hunting or other things like that
00:00:42
as you know someone who knows someone
00:00:44
things like that
00:00:46
networks can be found in all walks of
00:00:47
life a city's public transportation
00:00:49
system
00:00:50
the london tube is a great example of
00:00:52
this because it is a very well and
00:00:54
interconnected network and it's a very
00:00:56
big one too infrastructure such
00:00:59
as the national power grid for
00:01:00
electricity another very important
00:01:02
network
00:01:03
meeting and greeting your neighbors
00:01:04
again it's not a more of a safety
00:01:06
network in that case
00:01:07
the postal system for sending letters
00:01:09
and parcels and so on and so forth you
00:01:10
can see networks everywhere in your life
00:01:12
and they're very very important concepts
00:01:14
but more specifically in computing
00:01:16
networking is the same idea
00:01:18
just dispersed to technological devices
00:01:22
take your phone as an example the reason
00:01:24
that you have
00:01:25
it is to access things because if it
00:01:27
didn't do anything it'd be kind of like
00:01:29
an old uh
00:01:30
i don't know an old palm pilot or an old
00:01:33
pda
00:01:34
where you know it's not that much good
00:01:35
it can it may be a calculator
00:01:38
disputing the claim that your teacher
00:01:39
would say that you wouldn't have a
00:01:41
calculator carried around in your pocket
00:01:43
all the time
00:01:44
but you can see the importance of
00:01:45
networks we'll cover how these devices
00:01:47
communicate with each other in the rules
00:01:49
that
00:01:49
follow in computing a network can be
00:01:52
formed
00:01:52
by anywhere from two devices to billions
00:01:56
so
00:01:56
it doesn't really matter as long as it's
00:01:58
more than or two or more
00:01:59
these devices include everything from
00:02:01
your laptop and phone
00:02:03
to security cameras traffic lights and
00:02:05
even farming
00:02:07
networks are integrated into our
00:02:09
everyday life
00:02:10
be it gathering data for the weather
00:02:12
delivering electricity to homes
00:02:14
or even determining who has the right
00:02:16
way at
00:02:17
a road right of way rather because
00:02:20
networks are so embedded in the modern
00:02:22
day
00:02:23
networking is an essential concept to
00:02:24
grasp in cyber security
00:02:26
take the diagram below as an example
00:02:29
alice bob
00:02:29
and jim have formed their note or their
00:02:31
own network
00:02:32
we'll come on to this a bit later we'll
00:02:36
talk about this a little bit later on so
00:02:37
you can see just a basic network
00:02:39
networks come in all shapes and sizes
00:02:42
which is something that will also come
00:02:44
on to discuss throughout this module
00:02:46
let's go ahead and dive into the
00:02:47
question
00:02:48
what is the key term for devices that
00:02:50
are
00:02:51
connected together that is a network
00:02:55
and there we go we'll go ahead and close
00:02:58
that
00:02:58
and let's go ahead and go into task two
00:03:00
what is the internet
00:03:05
now that we've learned what a network is
00:03:06
and how one is defined in computing
00:03:08
just devices that are connected let's
00:03:10
explore the internet
00:03:11
the internet is one gigantic network
00:03:14
that consists of
00:03:15
many many small networks within itself
00:03:18
using our example from the previous task
00:03:20
let's now imagine that alice made some
00:03:22
new friends
00:03:23
named zayn and toby that she wants to
00:03:26
introduce to bob and jim
00:03:27
this is starting to sound like an office
00:03:29
reference the problem is
00:03:30
that alice is the only person who speaks
00:03:33
the same language as zayn and toby
00:03:35
so alice will have to be the messenger
00:03:37
and you can see that alice is here in
00:03:38
the middle
00:03:39
where she's the messenger for these two
00:03:42
because alice can speak both languages
00:03:44
they can communicate to one another
00:03:46
through alice forming a new network the
00:03:49
first iteration of the internet
00:03:51
was within the arpanet project in the
00:03:53
late 1960s
00:03:55
this project was funded by the united
00:03:56
states department of defense
00:03:58
or defense department and was the first
00:04:00
documented network in action
00:04:02
however it wasn't until 1909 when the
00:04:05
internet as we know it was invented by
00:04:07
tom or tim
00:04:08
berners-lee by the creation of the world
00:04:10
wide web or
00:04:11
otherwise shortened to www it wasn't
00:04:14
until this
00:04:15
point that the internet was used as a
00:04:17
repository for storing and sharing
00:04:18
information
00:04:19
like it is today let's relate alice's
00:04:22
network of friends to computing devices
00:04:24
the internet looks like a much larger
00:04:26
version of this diagram
00:04:28
and you can see this is a very
00:04:30
abbreviated
00:04:31
intensely abbreviated version of the
00:04:32
internet where we have many small
00:04:34
networks
00:04:35
that are interconnected with a
00:04:37
translating device in the form of a
00:04:38
router
00:04:39
even though this is not necessarily
00:04:41
translating it's nat
00:04:42
and pat don't worry about that right now
00:04:45
just know that this is just a way that
00:04:47
we have gateways
00:04:48
for our private networks to talk to the
00:04:49
internet
00:04:51
as previously stated the internet is
00:04:52
made up of many small networks all
00:04:54
joined together
00:04:56
these small networks are called private
00:04:58
networks so think your home network a
00:05:00
business network things like that
00:05:01
where networks connecting these small
00:05:03
networks are called public networks
00:05:05
try saying that 10 times fast or the
00:05:07
internet so to recap
00:05:09
a network can be one of two types a
00:05:12
private network
00:05:13
or a public network devices will use a
00:05:16
set of labels to identify themselves on
00:05:18
a network
00:05:19
which we will come onto in the task
00:05:21
below so who invented the worldwide
00:05:24
web that will be tim i'm gonna have to
00:05:27
grab his name from up here
00:05:28
because i can't spell it tim berners-lee
00:05:31
and we can just copy that
00:05:34
and there we go if i don't leave the
00:05:37
other part of the answer on there
00:05:39
all right perfect let's move into task
00:05:41
three identifying devices on a network
00:05:46
to communicate and maintain order
00:05:48
devices must be both identifying and
00:05:51
identifiable on a network what use
00:05:54
is it if you don't know whom you're
00:05:56
talking to at the end of the day
00:05:58
you know if just yelling into the void
00:06:00
and the void starts talking back that's
00:06:01
a little strange
00:06:03
devices on a network are very similar to
00:06:04
humans in the fact that we have
00:06:06
two ways of being identified via our
00:06:09
name and our fingerprints
00:06:10
among a couple other things but those
00:06:12
are good generalizations
00:06:14
now we have can change our name through
00:06:16
deed uh
00:06:18
poll but however uh we can't change our
00:06:21
fingerprints so
00:06:22
we can change your name we can't change
00:06:23
our fingerprints that's the general gist
00:06:24
of this
00:06:25
every human has a an identical set or
00:06:28
individual set of fingerprints which
00:06:29
means that even if they change their
00:06:31
name
00:06:31
there is still an identity behind it the
00:06:34
general idea behind this
00:06:36
is that yes you can change the
00:06:39
what you're called and that's something
00:06:41
that you know you might have a nickname
00:06:42
or other things like that
00:06:44
but you're always going to have some
00:06:46
permanently identifiable marks
00:06:48
and computers have the same thing
00:06:49
devices have the same thing they have an
00:06:51
ip address which can change
00:06:53
but they have a what's in theory a
00:06:56
globally unique
00:06:57
mac address or a media access control
00:06:59
address you can see that right there
00:07:01
think of it it's kind of similar to a
00:07:02
serial number but these are all
00:07:03
standardized
00:07:05
and it's split up in a couple of
00:07:06
different ways where the first half is
00:07:07
the manufacturer and the second part is
00:07:09
the
00:07:10
unique part i won't go too far into this
00:07:12
but just know that
00:07:13
well you can be called different things
00:07:15
your mac address is
00:07:16
generally in theory globally unique
00:07:20
ip addresses briefly an ip address or
00:07:23
internet protocol address can be used as
00:07:26
a way of identifying a host on a network
00:07:28
for a period of time
00:07:29
where that ip address can then be
00:07:31
associated with another device
00:07:32
without the ip address changing first
00:07:35
let's split up
00:07:35
precisely what an ip address is in the
00:07:38
diagram below
00:07:39
so before we go into this think of this
00:07:41
as your street address
00:07:42
other people can live there you probably
00:07:44
aren't the only person that's lived at
00:07:46
that address and you might not be
00:07:47
the only person you know using that
00:07:49
computer at that address
00:07:50
uh and this can change hands and it
00:07:52
might change over time with you know
00:07:54
people changing the way that the address
00:07:56
system is set up for streets
00:07:57
things like that but this is how we know
00:08:00
how to send
00:08:01
mail to you and the same thing goes for
00:08:03
computers an ip address is a set of
00:08:05
numbers
00:08:06
that are divided into four octets and
00:08:08
you can see one here
00:08:09
one here one here and then one here and
00:08:12
you can see that these have a range of
00:08:13
zero to two hundred and fifty-five
00:08:15
uh this is because they're made up of
00:08:17
eight binary bits
00:08:19
if i remember correctly and uh they the
00:08:22
range for that is zero with all the bits
00:08:25
being turned off
00:08:26
and then if you turn the model once or
00:08:28
everything is on
00:08:29
your limit is 255. the value of each
00:08:33
octet
00:08:33
will summarize to be the ip address of
00:08:37
the device on the network so all of
00:08:38
these put together
00:08:40
the individual octets can mean things
00:08:42
but generally speaking
00:08:43
don't worry about that right now this is
00:08:45
your straight address on the network
00:08:47
it's
00:08:47
how your computer knows to talk to
00:08:49
someone else so this might be your
00:08:50
router's address on your home network uh
00:08:52
this actual network itself is pretty
00:08:56
common
00:08:57
for home networks so 192.168.1.
00:09:01
and this last bit would be what changes
00:09:03
or sometimes this is a zero but these
00:09:05
first two
00:09:05
pretty common for home networks and
00:09:07
that's where you have the first and
00:09:08
second octet
00:09:10
or octets that are static i won't go too
00:09:12
far into that but just know that this
00:09:14
might be a router address it's very
00:09:16
common for that
00:09:17
uh what's important to understand here
00:09:19
is that the ip addresses can change from
00:09:20
device to device but they cannot
00:09:22
be active simultaneously more than once
00:09:25
so if you have a street address
00:09:26
your neighbor can't have the same one
00:09:29
you can swap houses with your neighbor
00:09:31
and that'd be a little weird
00:09:32
but you could you will have a different
00:09:34
address living at that house
00:09:35
you can't have that collision because
00:09:37
that causes problems and both of the
00:09:39
devices will say hold on
00:09:40
we need to figure something out here ip
00:09:43
addresses follow a set of standards
00:09:45
known as
00:09:45
protocols these protocols are the
00:09:47
backbone of networking
00:09:49
and force many devices to communicate in
00:09:51
the same language
00:09:52
which is something that we'll come on to
00:09:54
another time however we should recall
00:09:56
that devices
00:09:56
can be on both a private and public
00:09:59
network depending on where they
00:10:01
where they are will determine the type
00:10:02
of ip address they have a public or
00:10:04
private ip address
00:10:06
so real quick there was a note in here
00:10:10
protocols so the reason that we have
00:10:12
that and the reason that we all use the
00:10:14
same language
00:10:16
metaphorically speaking to talk to each
00:10:17
other over the internet
00:10:19
is because when the internet first came
00:10:21
out we had a bunch of different
00:10:22
protocols and sort of like trying to
00:10:24
talk
00:10:25
to a bunch of different people that
00:10:26
don't speak the same language doesn't
00:10:28
really work out you can kind of get the
00:10:29
general gist
00:10:30
but you know the the communication just
00:10:32
doesn't happen
00:10:33
so we established these protocols um and
00:10:35
they were something that were much more
00:10:37
uh solidified with the creation of wi-fi
00:10:39
uh definitely something that if you're
00:10:41
interested in learning a little bit more
00:10:42
the wikipedia page has a great summary
00:10:44
of why this is important
00:10:46
but generally speaking we have to have
00:10:48
rules otherwise
00:10:49
a lot of device manufacturers like
00:10:51
microsoft and hp ibm you go on name
00:10:53
whatever one you want
00:10:54
they'll just make their own and claim
00:10:56
it's the fastest and the other devices
00:10:58
won't work with it because they want you
00:10:59
to buy their device
00:11:00
so just keep that in mind that is why we
00:11:02
have protocols
00:11:03
that force everyone to use the same
00:11:05
standardized
00:11:06
communication a public address is used
00:11:09
to identify the device on the internet
00:11:11
whereas a private address is used to
00:11:13
identify a device amongst
00:11:14
other devices i think of this home
00:11:17
network
00:11:18
versus anyone can talk to it on the
00:11:19
internet generally speaking
00:11:22
take the table a and screenshot below as
00:11:24
an example
00:11:25
here we have two devices on a private
00:11:27
network and we can see the private
00:11:28
ranges right here
00:11:30
there are three private ranges
00:11:32
predominantly
00:11:33
uh 192.168 and these last two bits can
00:11:36
change
00:11:36
our last two octets rather can change is
00:11:38
a major one
00:11:39
uh the 10 zero zero zero
00:11:43
is another big one and there's another
00:11:45
one that i can never remember the fall
00:11:46
of it uh because it has a range
00:11:48
in the second octet um i recommend
00:11:50
taking a look at these and we might go
00:11:51
over them later in the room but just
00:11:52
know that there are three very distinct
00:11:55
ranges that the private ip1s can fall
00:11:56
into and these
00:11:58
would be public because they don't fall
00:11:59
into that range and we can see them
00:12:01
labeled over here on the side
00:12:03
uh these will be on the same network
00:12:04
because these are well
00:12:06
okay in theory they could be on the same
00:12:08
network they might not necessarily but
00:12:10
they're very likely to be
00:12:11
because we have 192 168 1 and then 74
00:12:14
and then 77.
00:12:16
these could exist on the same network
00:12:17
because they don't conflict um and they
00:12:19
could talk to each other in theory if
00:12:20
there's not routing rules or other
00:12:22
restrictions in play uh and here you can
00:12:25
see
00:12:25
this would might be a screenshot from a
00:12:28
router
00:12:28
that we have these two devices with
00:12:31
their mac addresses
00:12:32
don't worry too much about this right
00:12:34
now just know that this is in theory
00:12:36
unique
00:12:37
and these are the private ip addresses
00:12:40
that
00:12:40
they have on the network and they were
00:12:43
assigned via dhcp which just means that
00:12:45
i have a pool of addresses first come
00:12:47
first serve and we give them out
00:12:49
and they're not necessarily like you get
00:12:51
this one permanently on this network
00:12:53
that would be a static addressing these
00:12:56
two devices will be able to use
00:12:57
their private ip addresses to
00:12:59
communicate with each other
00:13:00
however any data sent to the internet
00:13:03
from either of these
00:13:04
devices will be identified by the same
00:13:06
public ip address so your home would
00:13:08
have a public ip address in this case
00:13:10
but you'll have your private ip your
00:13:12
private network sits behind that
00:13:14
public ip addresses are given by your
00:13:16
internet service provider or
00:13:18
isp for short uh at your monthly bill so
00:13:22
when you buy when you have an internet
00:13:24
service contract set up
00:13:25
you'll have a nip address that is
00:13:27
associated with your home
00:13:28
uh sometimes this can be associated with
00:13:30
a couple different homes
00:13:32
this can get a little weird you can pay
00:13:35
to have this not change and be static
00:13:37
but just know that this is something
00:13:39
that exists on the public internet in
00:13:41
this case
00:13:43
as more and more devices become
00:13:45
connected it is becoming increasingly
00:13:47
harder to get
00:13:48
a public address that isn't already in
00:13:50
use uh for example
00:13:51
cisco an industry giant in the world of
00:13:53
networking estimated that there will be
00:13:55
approximately 50 billion devices
00:13:57
connected on the internet by the end of
00:13:59
the
00:13:59
uh 2021. so the current year in the time
00:14:02
of this recording
00:14:03
enter ip address uh or address versions
00:14:07
so far we've only discussed one version
00:14:09
of the internet protocol
00:14:10
addressing scheme known as ipv4 ipv4 is
00:14:14
pretty old it had some limitations that
00:14:17
we didn't really anticipate
00:14:18
this many devices to be connected to the
00:14:19
internet uh but we have smart homes and
00:14:22
other things like that which
00:14:23
dramatically increases uh the number of
00:14:26
devices that we're connecting to the
00:14:28
internet on the whole
00:14:29
especially if they need public addresses
00:14:32
and this uses a numbering system
00:14:33
uh of two raised to the 32nd ip
00:14:36
addresses so
00:14:37
4.92 or 29 billion
00:14:40
so you can see where there's a shortage
00:14:41
because we have more devices that are
00:14:43
connected to the public internet
00:14:46
than we have available for ipv4
00:14:49
addresses
00:14:50
ipv6 is a relatively new iteration
00:14:53
of the internet protocol addressing
00:14:55
scheme to help tackle this
00:14:57
issue although it is seemingly more
00:14:59
daunting it boasts a few benefits
00:15:02
so it supports up to two to the 128th
00:15:05
power of ip addresses so this is 340
00:15:08
trillion plus
00:15:09
uh in theory we should ever run out of
00:15:11
these we'll see what happens
00:15:13
uh just because more devices are being
00:15:15
connected um and it resolves that big
00:15:17
issue with ipv4 because we were going to
00:15:19
run out
00:15:20
now we really can't more efficient due
00:15:22
to more or new methodologies so there's
00:15:24
a bunch of new technologies that were
00:15:26
introduced in this
00:15:26
don't worry too much about knowing this
00:15:29
just know that in general ipv6 has a
00:15:31
bunch of
00:15:31
cool new shiny features and you can see
00:15:34
there's a comparison of those two
00:15:36
addresses so
00:15:36
with an ipv4 we had these four octets
00:15:40
and this is a lot longer i won't go too
00:15:42
much in the detail just
00:15:43
know that ipv6 exists this is not as
00:15:46
common to see
00:15:47
on home networks generally speaking you
00:15:50
need to know about this just that it
00:15:51
exists
00:15:52
and once you get further into
00:15:53
penetration testing or defense
00:15:55
knowing that ipv6 is another way that
00:15:58
things can talk to each other
00:15:59
that's just another thing to be aware of
00:16:01
so that's all you need to know
00:16:03
at this point in time just focus on ipv6
00:16:06
and this is going to be where most
00:16:08
everybody focuses nowaday
00:16:10
anyhow let's go ahead and talk about mac
00:16:12
addresses
00:16:14
devices on a network will all have a
00:16:16
physical network interface
00:16:18
which is a micro trip board found on the
00:16:19
device's motherboard this is your
00:16:21
ethernet port
00:16:22
or your wi-fi card whatever this is this
00:16:25
network interface is assigned a unique
00:16:27
address at the factory it was built at
00:16:29
called a mac address a media access
00:16:32
control address
00:16:33
this is referred to as burnt in uh in
00:16:35
quotation marks
00:16:36
uh this is because in theory can't be
00:16:38
changed you can do spoofing and other
00:16:40
things with this
00:16:41
don't worry about that too much right
00:16:42
now just know again this is in theory
00:16:45
globally unique and the odds that you're
00:16:47
gonna have two devices on the same
00:16:49
network that have the same mac
00:16:51
very very very very infinitesimally
00:16:54
small chance
00:16:55
big businesses can run into this every
00:16:56
once in a while but it's pretty rare
00:16:59
the mac address is a 16 character
00:17:01
hexadecimal
00:17:02
number a base 16 numbering system used
00:17:05
in computing
00:17:06
to represent numbers you can see that
00:17:08
this is hex
00:17:09
b16 where it rolls over from nine
00:17:12
and it starts a b c d e and then
00:17:15
f is the last one and you can see that
00:17:18
this is an example
00:17:19
of a mac address here where it is six
00:17:22
groups of two of these the first six
00:17:25
characters represent the company that
00:17:26
made it so right here
00:17:28
that made the networking interface and
00:17:29
the last six is in theory a unique
00:17:32
number
00:17:33
so and you can see that broken apart
00:17:35
down here
00:17:36
however an interesting thing with mac
00:17:39
addresses is that they can be faked or
00:17:41
spoofed as i mentioned before
00:17:43
this spoofing occurs when a network
00:17:44
device pretends to identify
00:17:46
as another by using its mac address when
00:17:49
this happens it can often break
00:17:51
poorly implemented security designs that
00:17:53
assume devices
00:17:54
talking on a network are trustworthy
00:17:56
because they're not
00:17:57
don't worry too much about this this is
00:17:59
more of a situation of just know about
00:18:01
this
00:18:01
it's not something too major and you'll
00:18:04
come across it
00:18:05
later on in your security career take
00:18:08
the following example
00:18:09
a firewall is configured to allow any
00:18:11
communication going to
00:18:12
and from the mac address of the
00:18:14
administrator if the device were to
00:18:16
pretend or
00:18:17
spoof this mac address this firewall
00:18:19
would
00:18:20
now think that it is receiving
00:18:22
communication from the administrator
00:18:23
when it is not so places such as cafes
00:18:27
coffee shops and hotels alike often use
00:18:29
mac address control
00:18:31
when using their guest or public wi-fi
00:18:34
this configuration could offer better
00:18:35
services
00:18:36
i.e a faster connection for a price if
00:18:38
you're willing to pay
00:18:39
the fee per device uh the interactive
00:18:42
lab attached to this task has been made
00:18:43
to replicate this scenario
00:18:45
and let's go ahead and spin that up
00:18:46
right now so in theory you could just
00:18:48
pretend to be someone else
00:18:49
that is something that happens let's go
00:18:52
ahead and scroll back down
00:18:54
to the practical bit
00:18:57
the interactive labs simulate a hotel
00:19:00
wi-fi network
00:19:00
we have to pay for the service you'll
00:19:03
notice that the router is not allowing
00:19:05
bob's traffic bob being right down here
00:19:07
but alice's package green right here are
00:19:09
going through
00:19:10
just fine because she paid for the wi-fi
00:19:12
try changing bob's mac address to the
00:19:14
same as alice's and see what happens
00:19:17
and let's see i think i need to scroll
00:19:18
down and
00:19:22
let's try changing these to be
00:19:25
the same if i can type this all out
00:19:29
let's see if i can just highlight this
00:19:31
copy
00:19:33
oh i can and there we go and now
00:19:35
suddenly we can talk out to the internet
00:19:37
and we got a flag uh don't worry too
00:19:39
much if you can't read that i'm going to
00:19:40
go ahead and paste that here
00:19:44
so thm you got on try hack me so in
00:19:47
theory you could spoof your back address
00:19:48
if you haven't paid for wi-fi like this
00:19:51
just something to know about
00:19:53
again just know the idea that mac
00:19:55
address control exists
00:19:56
and that mac addresses are in theory
00:19:58
globally unique that's really all you
00:20:00
need to get from this
00:20:01
let's go ahead and go into the other
00:20:02
questions what does the term
00:20:05
ip stand for that is going to be
00:20:07
internet
00:20:08
protocol what is
00:20:11
each section of an ip address called
00:20:13
that is going to be an octet
00:20:16
how many sections in digits does an ip
00:20:18
address have
00:20:19
that will be four and let's see what
00:20:22
does the term
00:20:23
mac stand for media
00:20:26
address control i believe
00:20:30
uh it should be access control i'm
00:20:32
guessing
00:20:35
there we go perfect let's go to move
00:20:37
into task
00:20:38
4 ping with icmp let's go and pull this
00:20:41
up so we don't have to watch back it's
00:20:42
fly across
00:20:45
ping is one of the most fundamental
00:20:47
network tools available to us
00:20:49
ping uses icmp internet control message
00:20:52
protocol
00:20:52
packets to determine the performance of
00:20:55
a connection between devices
00:20:57
for example if the connection exists or
00:20:59
is reliable so
00:21:01
this is a way that we can determine
00:21:03
performance
00:21:04
the time taken for icmp packets
00:21:06
traveling between devices
00:21:07
is measured by ping as such as in the
00:21:10
screenshot below we can see the output
00:21:12
of a ping command here
00:21:13
this measuring is done using icmp's echo
00:21:16
packet
00:21:17
and then icmp is echo reply from the
00:21:19
target device and you can see
00:21:21
that we have a ping command with our
00:21:22
target up here and then we have our time
00:21:25
here
00:21:25
and then it looks like we have our
00:21:27
average back here
00:21:29
so the average performance or how much
00:21:31
time it takes us to talk to another
00:21:32
device
00:21:34
pings can be performed against devices
00:21:35
on a network such as your home network
00:21:37
or research
00:21:38
resources such as websites this tool can
00:21:41
be
00:21:42
easily used incomes installed on
00:21:43
operating systems os's
00:21:45
such as linux and windows the syntax to
00:21:48
do
00:21:48
a simple ping is ping and then the ip
00:21:51
address right here
00:21:52
or your website url so ping is the
00:21:53
command and then either the website url
00:21:56
or the ip address and you can see that
00:21:57
demonstrated down here
00:21:59
here we are pinging a device that has
00:22:01
the private address of 192.168.1.254
00:22:06
ping informs us that we have sent six
00:22:09
icmp packets
00:22:10
all of which were received with an
00:22:12
average time of 5.3 seconds
00:22:15
now that now you are going to do the
00:22:17
same thing to paying the ip address
00:22:19
of 888 this is one of google's dns
00:22:22
servers
00:22:23
on the deployable website in this task
00:22:25
paying the correct address will reveal
00:22:27
a flag and answer the following
00:22:30
questions
00:22:31
let's see so let's go ahead and dive
00:22:33
into the questions what protocol does
00:22:35
ping use
00:22:36
icmp if i can type
00:22:39
what is the syntax you paying all tens
00:22:43
that will be 10 or ping 10 10
00:22:46
10 10 and what flag do you get when you
00:22:48
ping
00:22:49
quad eights uh let's see
00:22:52
i guess we just put it up here and then
00:22:56
we'll go and send our ping requests
00:22:58
and we have just a moment to finish its
00:23:01
ping
00:23:02
and then we have our flag i pinged the
00:23:04
server let's go and copy that
00:23:06
and we'll paste it in and let's move
00:23:08
into task five
00:23:10
continue your learning intro to lan
00:23:12
continue your learning by joining the
00:23:14
intro to land room
00:23:16
we'll go and mark that as complete and
00:23:17
otherwise i will see you in the video
00:23:19
for that room
00:23:20
uh but until then as always i have the
00:23:22
try hack me discord
00:23:24
as well as the separate linked in the
00:23:26
video description below if you have any
00:23:27
questions feel free to hop in there
00:23:29
but until next time happy hacking