Description
Learn how to enumerate protocols, processes, and services on Windows and Linux machines, and study for the Certified Ethical Hacker exam.
Ethical hacking is one of the most desired stills for any IT security professional. White hat hackers can detect, prevent, and mitigate network intrusions and data theft: a critical liability for any company that does business online or in the cloud. This course introduces to the concept of enumerationâidentifying the resources on a host or network, including user names, ports and services, policies, and more. It covers protocol, process, and service enumeration on Windows and Linux, and maps to the Enumeration competency from the Certified Ethical Hacker (CEH) body of knowledge. Malcolm discusses host profiling, enumerating protocols (such as SMB, RPC, and SNMP), and enumerating the Internet, and concludes with demos of third-party tools organizations can use to mitigate risk, including SuperScan, NetScan Pro, and JXplorer.
An overview of the CEH exam, blueprint, and eligibility criteria can be found at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
Tags
Syllabus
- Find out everything about a target
- What you should know
- Disclaimer
- What is enumeration?
- Understanding contexts
- Working with contexts
- Understanding NetBIOS, SMB, SAMBA, and RPC
- Profiling a Unix host
- Profiling a Windows host
- Investigating the Windows network Interface
- Investigating the Linux network Interface
- Enumerating Host Services
- Enumerating SMB from Linux: Episode 1
- Enumerating SMB from Linux: Episode 2
- Enumerating SMB from Linux: Episode 3
- Enumerating SMB from Windows: Episode 1
- Enumerating SMB from Windows: Episode 2
- SNMP enumeration
- Enumerating with RPC
- Using WMI to enumerate Windows
- Enumeration using Finger
- Remote enumeration using PowerShell
- What's that web server?
- Getting into a website with Nikto
- Refresher on enumerating webpages
- Enumerating hidden webpages
- Database enumeration with sqlmap
- Tracing Internet routes
- Using Shodan
- Scanning the Internet with ZMap
- Introducing SuperScan
- Running NetScanTools Pro
- Enumerating LDAP
- Checking for SMTP users
- Summary
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/c79fc60e2e52.jpeg)
Ethical Hacking: Enumeration
-
TypeOnline Course
-
Provider
Ethical hacking is one of the most desired stills for any IT security professional. White hat hackers can detect, prevent, and mitigate network intrusions and data theft: a critical liability for any company that does business online or in the cloud. This course introduces to the concept of enumerationâidentifying the resources on a host or network, including user names, ports and services, policies, and more. It covers protocol, process, and service enumeration on Windows and Linux, and maps to the Enumeration competency from the Certified Ethical Hacker (CEH) body of knowledge. Malcolm discusses host profiling, enumerating protocols (such as SMB, RPC, and SNMP), and enumerating the Internet, and concludes with demos of third-party tools organizations can use to mitigate risk, including SuperScan, NetScan Pro, and JXplorer.
An overview of the CEH exam, blueprint, and eligibility criteria can be found at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Find out everything about a target
- What you should know
- Disclaimer
- What is enumeration?
- Understanding contexts
- Working with contexts
- Understanding NetBIOS, SMB, SAMBA, and RPC
- Profiling a Unix host
- Profiling a Windows host
- Investigating the Windows network Interface
- Investigating the Linux network Interface
- Enumerating Host Services
- Enumerating SMB from Linux: Episode 1
- Enumerating SMB from Linux: Episode 2
- Enumerating SMB from Linux: Episode 3
- Enumerating SMB from Windows: Episode 1
- Enumerating SMB from Windows: Episode 2
- SNMP enumeration
- Enumerating with RPC
- Using WMI to enumerate Windows
- Enumeration using Finger
- Remote enumeration using PowerShell
- What's that web server?
- Getting into a website with Nikto
- Refresher on enumerating webpages
- Enumerating hidden webpages
- Database enumeration with sqlmap
- Tracing Internet routes
- Using Shodan
- Scanning the Internet with ZMap
- Introducing SuperScan
- Running NetScanTools Pro
- Enumerating LDAP
- Checking for SMTP users
- Summary