Ethical Hacking: Enumeration
Offered By: Pluralsight
Course Description
Overview
The third phase attackers perform on a target is enumerating accounts and services. This course will teach you skills attackers use for enumeration that needed for the Certified Ethical Hacking exam.
To truly compromise a system, making sure you know what OS, accounts, and services that are running is key. In this course, Ethical Hacking: Enumeration, you’ll learn to identify accounts and services through enumeration. First, you’ll explore how to use NetBIOS to expose intel. Next, you’ll discover how to use LDAP to expose user accounts and other protocols to complete your enumeration tasks. Finally, you’ll learn the countermeasures to thwart enumeration attacks. When you’re finished with this course, you’ll have the skills and knowledge of enumeration techniques needed for the Certified Ethical Hacking exam.
To truly compromise a system, making sure you know what OS, accounts, and services that are running is key. In this course, Ethical Hacking: Enumeration, you’ll learn to identify accounts and services through enumeration. First, you’ll explore how to use NetBIOS to expose intel. Next, you’ll discover how to use LDAP to expose user accounts and other protocols to complete your enumeration tasks. Finally, you’ll learn the countermeasures to thwart enumeration attacks. When you’re finished with this course, you’ll have the skills and knowledge of enumeration techniques needed for the Certified Ethical Hacking exam.
Syllabus
- Course Overview 1min
- Discussing Enumeration and the Techniques Used 17mins
- Defaults and NetBIOS 35mins
- Capture SNMP Enumeration 12mins
- Demonstrating LDAP Enumeration 12mins
- Examining NTP and NFS Enumeration 7mins
- Exploring SMTP Enumeration 12mins
- Employing DNS Enumeration 15mins
- Acquiring Intel from Other Enumeration Techniques 24mins
- Discovering Enumeration Countermeasures 12mins
- Domain Summary 3mins
Taught by
Dale Meredith
Related Courses
Spring Framework: Authenticating Users with Spring SecurityPluralsight Learn DevOps: On-Prem or Cloud Agnostic Kubernetes
Udemy Spring Security Basics
YouTube Splunk Enterprise Administration: Managing Users and Authentication
Pluralsight Ethical Hacking: Enumeration
Pluralsight