Ethical Hacking: Enumeration
Offered By: LinkedIn Learning
Course Description
Overview
Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.
Syllabus
Introduction
- Starting your testing with enumeration
- What you need to know
- Disclaimer
- What is enumeration?
- Understanding contexts
- Working with contexts
- Understanding NetBIOS, SMB, SAMBA, and RPC
- Profiling a Unix host
- Profiling a Windows host
- Investigating the Windows network interface
- Investigating the Linux network interface
- Enumerating host services
- Enumerating SMB from Linux: Episode 1
- Enumerating SMB from Linux: Episode 2
- Enumerating SMB from Linux: Episode 3
- Enumerating SMB from Windows: Episode 1
- Enumerating SMB from Windows: Episode 2
- Enumerating using SNMP
- Enumerating with RPC
- Using WMI to enumerate Windows
- Enumeration using Finger
- Remote enumeration using PowerShell
- What is that web server?
- Enumerating a website with Nikto
- Enumerating webpages
- Enumerating hidden webpages
- Tracing routes across the internet routes
- Using Shodan
- Scan the internet with ZMap
- Enumeration of the cloud
- Enumerating cloud policies
- Enumerating cloud compute resources
- Enumerating cloud storage resources
- Scanning with SuperScan
- Scanning with NetScanTools Pro
- Enumerating LDAP
- Checking for SMTP users
- Digging into DNS
- Enumerating netbios
- Taking time to enumerate
- Next steps
Taught by
Malcolm Shore
Related Courses
Ubuntu Linux Server BasicsUdemy Violão do Zero ao Samba (em Português)
Udemy Building an Ubuntu Server
LinkedIn Learning Learning CentOS Linux
LinkedIn Learning Linux System Engineer: Network Filesystems Using NFS and Samba
LinkedIn Learning