Nmap for Penetration Testing: From Beginner to Advanced
Offered By: Packt via Coursera
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
In this comprehensive course, you will embark on a journey through the fundamentals and advanced techniques of Nmap, a critical tool for network scanning and penetration testing. Starting with an introduction and the setup of your working environment, you'll quickly move into compiling Nmap from source and understanding its significance in network scanning. This course is meticulously updated for 2021, ensuring you are equipped with the latest knowledge and techniques.
As you progress, you'll delve into networking fundamentals, exploring port scanning, the OSI model, and the intricacies of the network and transport layers. The course then guides you through host discovery methods, including various ping scans and traceroute techniques, ensuring a robust understanding of how to identify live hosts on a network. Each module builds on the last, with a dedicated section on advanced scanning techniques where you’ll learn about different scan types, operating system detection, and aggressive scanning strategies.
The final sections cover essential skills for penetration testers, including firewall detection and evasion, scan timing, performance optimization, and the Nmap Scripting Engine (NSE). Service enumeration modules will provide hands-on experience in identifying and analyzing various network services, enhancing your capability to detect vulnerabilities and assess network security comprehensively. By the end of this course, you will have a deep and practical understanding of Nmap, positioning you as an adept network security professional.
This course is designed for cybersecurity professionals, network administrators, and IT enthusiasts who want to deepen their knowledge of network scanning and penetration testing using Nmap. Basic understanding of networking concepts is recommended but not mandatory.
Syllabus
- Introduction
- In this module, we will explore the foundational aspects of Nmap, starting with an introduction to its capabilities and features. We will then guide you through setting up your working environment, compiling Nmap from source, and discussing its critical role in network scanning. This section sets the stage for a comprehensive understanding of Nmap and its applications.
- Networking Fundamentals
- In this module, we will delve into the core concepts of networking that are essential for effective network scanning and security. We will begin with an overview of port scanning techniques, followed by an in-depth look at the OSI Model. You'll gain a solid understanding of the Network and Transport Layers, and we will conclude with a detailed analysis of TCP header flags and the TCP 3-way handshake, critical for ensuring reliable data communication.
- Host Discovery
- In this module, we will explore a range of host discovery techniques crucial for network reconnaissance. Starting with ping sweeps, we will cover various methods including TCP SYN and ACK pings, UDP ping scans, and ARP ping. We will also delve into the use of ICMP ECHO and Timestamp pings, IP Protocol pings, and conclude with an in-depth look at traceroute and reverse DNS resolution. This section provides the tools needed to effectively discover and map hosts within a network
- Advanced Scanning
- In this module, we will dive into advanced scanning techniques using Nmap. You'll learn to set up a virtual hacking lab and deploy Metasploitable3 VM images for hands-on practice. We'll cover a variety of scan types, including default scans, TCP Connect, SYN, and UDP scans, as well as more sophisticated techniques like OS detection, service detection, and aggressive scanning. Additionally, you'll explore options for verbosity, output, logging, and visualizing scan results with WebMap. This section equips you with the skills to conduct thorough and efficient network scans.
- Firewall Detection and Evasion
- In this module, we will cover the techniques for detecting and evading firewalls during network scanning activities. You will learn how to use ACK probing to identify firewall presence, employ packet fragmentation to circumvent security barriers, and specify MTU settings to fine-tune your evasion methods. Additionally, we will explore the use of IP decoys to mask scanning origins and MAC address spoofing to conceal the identity of your devices. This section equips you with advanced strategies to navigate and bypass network defenses.In this module, we will cover the techniques for detecting and evading firewalls during network scanning activities. You will learn how to use ACK probing to identify firewall presence, employ packet fragmentation to circumvent security barriers, and specify MTU settings to fine-tune your evasion methods. Additionally, we will explore the use of IP decoys to mask scanning origins and MAC address spoofing to conceal the identity of your devices. This section equips you with advanced strategies to navigate and bypass network defenses.
- Scan Timing and Performance
- In this module, we will focus on enhancing the timing and performance of your scans using Nmap. You'll learn how to apply timing templates to streamline scan operations, utilize parallelism to execute multiple scans concurrently, and configure host timeout settings to control scan durations. Additionally, we will explore adjusting scan delay to ensure efficient scanning without overloading the network. This section provides the tools to maximize the effectiveness and efficiency of your scanning activities
- Nmap Scripting Engine (NSE)
- In this module, we will introduce you to the Nmap Scripting Engine (NSE) and its powerful capabilities for network scanning and automation. You'll learn the syntax and structure of NSE scripts, making it easier to understand and modify them. We'll explore the different script categories and their specific uses, enabling you to select the right scripts for your tasks. Additionally, you'll gain the skills to develop custom NSE scripts, enhancing Nmap's functionality to suit your unique requirements. This section equips you with the knowledge to leverage NSE for advanced scanning and automation.
- Service Enumeration
- In this module, we will dive into service enumeration techniques to extract detailed information about network services. You'll learn to perform banner grabbing, utilize Whois and traceroute for network enumeration, and conduct FTP and SMTP enumeration. We will explore DNS enumeration techniques, including zone transfers and brute-forcing, and delve into HTTP enumeration for identifying methods, hidden files, and WAFs. Additionally, we'll cover SMB and MySQL enumeration, and conclude with vulnerability scanning using Nmap. This section equips you with the skills to thoroughly investigate and analyze network services for security assessments
Taught by
Packt - Course Instructors
Related Courses
Certified Ethical Hacking (v12)LearnKartS via Coursera An Introduction to Ethical Hacking with Kali Linux
Packt via Coursera Getting Started in Port Scanning Using Nmap and Kali Linux
Packt via Coursera Intermediate Ethical Hacking Hands-on Training
Packt via Coursera Intermediate Ethical Hacking Techniques
Packt via Coursera