Ethical Hacking: Enumeration
Offered By: Pluralsight
Course Description
Overview
Pluralsight is not an official partner or accredited training center of
EC-Council. Now that we've found out "live" systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data.
Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Topics:
Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Topics:
- Enumeration Explained & the Techniques Used
- Enumerating via Defaults & NetBIOS
- Enumerating via SNMP
- Enumerating via LDAP
- Enumerating via NTP
- Enumerating via SMTP
- Enumerating via DNS
- Oh, There's More
- Countermeasures for Enumeration
Taught by
Dale Meredith
Related Courses
Implementing DNS in Microsoft Windows ServerMicrosoft via edX Networking for Web Developers
Udacity Microsoft Windows Server 2012 Fundamentals: DNS
Microsoft via edX Windows Server 2016: Basic Networking
Microsoft via edX The Bits and Bytes of Computer Networking
Google via Coursera