YoVDO

Ethical Hacking: Enumeration

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Cybersecurity Courses Windows Courses Unix Courses Samba Courses SNMP Courses

Course Description

Overview

Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.

Syllabus

Introduction
  • Starting your testing with enumeration
  • What you need to know
  • Disclaimer
1. Basics of Enumeration
  • What is enumeration?
  • Understanding contexts
  • Working with contexts
  • Understanding NetBIOS, SMB, SAMBA, and RPC
2. Local Host Enumeration
  • Profiling a Unix host
  • Profiling a Windows host
  • Investigating the Windows network interface
  • Investigating the Linux network interface
3. Enumeration Remote Hosts
  • Enumerating host services
  • Enumerating SMB from Linux: Episode 1
  • Enumerating SMB from Linux: Episode 2
  • Enumerating SMB from Linux: Episode 3
  • Enumerating SMB from Windows: Episode 1
  • Enumerating SMB from Windows: Episode 2
  • Enumerating using SNMP
  • Enumerating with RPC
  • Using WMI to enumerate Windows
  • Enumeration using Finger
  • Remote enumeration using PowerShell
4. Enumerating Web Apps
  • What is that web server?
  • Enumerating a website with Nikto
  • Enumerating webpages
  • Enumerating hidden webpages
5. Enumerating the Internet
  • Tracing routes across the internet routes
  • Using Shodan
  • Scan the internet with ZMap
6. Enumerating Cloud
  • Enumeration of the cloud
  • Enumerating cloud policies
  • Enumerating cloud compute resources
  • Enumerating cloud storage resources
7. Other Enumeration
  • Scanning with SuperScan
  • Scanning with NetScanTools Pro
  • Enumerating LDAP
  • Checking for SMTP users
  • Digging into DNS
  • Enumerating netbios
  • Taking time to enumerate
Conclusion
  • Next steps

Taught by

Malcolm Shore

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network