Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking: Scanning Networks

Description

Pluralsight is not an official partner or accredited training center of EC-Council. You know how to recon your target, now it's time to learn how to dig around what you've found for important, relevant data in preparation for your attack.

Pluralsight is not an official partner or accredited training center of EC-Council. So, after reconnaissance, we need to scan for basics, kind of like knocking on all the doors to see who is home and what they look like. Then, when you find a machine that's "live", we need to get to know it really well, asking some rather personal questions like, "what OS are you running?" or "what applications are you running?" and "which ports are listening on the network?". We'll go over all you'll need to know for the exam regarding scanning, and play with some pretty fun tools along the way. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Topics:

  • Overview of Scanning
  • Understanding the 3-way Handshake
  • Checking for "Live" Systems and Their Open Ports
  • Types of Scanning
  • Banner Grabbing and OS Fingerprinting
  • Vulnerability Scanning and Drawing Out the Network
  • Preparing Proxies and Other Anonymizing Techniques

Tags
Online Course


Ethical Hacking: Scanning Networks

Affiliate notice

Pluralsight is not an official partner or accredited training center of EC-Council. You know how to recon your target, now it's time to learn how to dig around what you've found for important, relevant data in preparation for your attack.

Pluralsight is not an official partner or accredited training center of EC-Council. So, after reconnaissance, we need to scan for basics, kind of like knocking on all the doors to see who is home and what they look like. Then, when you find a machine that's "live", we need to get to know it really well, asking some rather personal questions like, "what OS are you running?" or "what applications are you running?" and "which ports are listening on the network?". We'll go over all you'll need to know for the exam regarding scanning, and play with some pretty fun tools along the way. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Topics:
  • Overview of Scanning
  • Understanding the 3-way Handshake
  • Checking for "Live" Systems and Their Open Ports
  • Types of Scanning
  • Banner Grabbing and OS Fingerprinting
  • Vulnerability Scanning and Drawing Out the Network
  • Preparing Proxies and Other Anonymizing Techniques