Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking: Enumeration

Description

Pluralsight is not an official partner or accredited training center of EC-Council. Now that we've found out "live" systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data.

Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Topics:

  • Enumeration Explained & the Techniques Used
  • Enumerating via Defaults & NetBIOS
  • Enumerating via SNMP
  • Enumerating via LDAP
  • Enumerating via NTP
  • Enumerating via SMTP
  • Enumerating via DNS
  • Oh, There's More
  • Countermeasures for Enumeration

Tags
Online Course


Ethical Hacking: Enumeration

Affiliate notice

Pluralsight is not an official partner or accredited training center of EC-Council. Now that we've found out "live" systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data.

Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Topics:
  • Enumeration Explained & the Techniques Used
  • Enumerating via Defaults & NetBIOS
  • Enumerating via SNMP
  • Enumerating via LDAP
  • Enumerating via NTP
  • Enumerating via SMTP
  • Enumerating via DNS
  • Oh, There's More
  • Countermeasures for Enumeration