1
00:00:06,540 --> 00:00:12,349
Okay, let's do sudo ipa. You don't really need
sudo. But hey, I'm doing it automatically and doesn't hurt.

2
00:00:13,369 --> 00:00:16,899
I have my ENS160 which
is in the state of UP.

3
00:00:17,699 --> 00:00:22,800
And what else do we see? It's dynamically assigned.
That means that there's a DHCP server behind it.

4
00:00:23,410 --> 00:00:25,589
And this is
the inetv4 address.

5
00:00:26,129 --> 00:00:30,380
It also has an inetv6 address which
is the ipv6 address. But as I

6
00:00:30,380 --> 00:00:34,630
told you before, that is not
really something that is used a lot.

7
00:00:35,329 --> 00:00:41,155
So to verify that we can reach
out to google.com I use ping google.com and

8
00:00:41,155 --> 00:00:46,980
that's all. I'm not going to check
my hostname resolution and my routing table.

9
00:00:47,380 --> 00:00:53,210
I would only do that if pingongoogle.com is giving me a
failure because then you want to know what's going on, right?

10
00:00:53,729 --> 00:00:58,450
And the option is that you get
hostname could not be resolved. So let's do

11
00:00:58,450 --> 00:01:03,170
a ping on something that doesn't exist.
Then you can see the error message.

12
00:01:03,890 --> 00:01:09,930
Here you see the error message name or service not
known. That means typically that it's not available in DNS.

13
00:01:10,590 --> 00:01:17,109
And if that happens for a server that should be
available, well then the next test would be to ping 8.8.8.8.

14
00:01:18,329 --> 00:01:22,284
Everybody on the planet is using
it. It's a Google DNS server,

15
00:01:22,284 --> 00:01:26,239
it's very much available and
use it as a connectivity test.

16
00:01:26,680 --> 00:01:30,950
If you can ping 8.8.8.8 and
you cannot ping DNS names, at least

17
00:01:30,950 --> 00:01:35,219
you know that the problem is
DNS related and not routing related.

18
00:01:36,659 --> 00:01:42,269
Next SS Tul which is
showing services currently offered on

19
00:01:42,269 --> 00:01:47,879
my system. No need
to do sudo for that.

20
00:01:48,760 --> 00:01:55,760
Now when I want to do NMAP the then I
do need sudo nmap and let's do sudo NMAP on localhost.

21
00:01:56,379 --> 00:02:01,405
Now funny thing is that when we
use sudo NMAP on localhost it's only

22
00:02:01,405 --> 00:02:06,430
scanning some of the most common ports
and that's why it doesn't find everything.

23
00:02:06,930 --> 00:02:11,120
NMAP has a ton of options.
Go explore them if you want

24
00:02:11,120 --> 00:02:15,310
to learn more about all
the rich possibilities of this utility.
