Main Menu

 Home 

 Software 
    - Driver 
    - Graphic & Design 
    - Internet 
    - MacOSX 
    - Multimedia 
    - Office 
    - Portable 
    - Security 
    - System 

 Music 
    - Mp3 
    - Music Video 

 Games 
    - PC 
    - Console 

 Books 
    - Audiobook 
    - Comic 
    - eBook 
    - Magazine 
    - Video Training 

 Movies 
    - Amine 
    - Cam 
    - DVD 
    - HD/BluRay 
    - TV Show 
    - Documentary 

 Graphics 
    - 3D Model 
    - icon 
    - Font 
    - Footage 
    - Photoshop 
    - Template 
    - Vector 
    - Stock 
    - Script/Plugin 
    - Wallpaper 

 Mobile 
    - iOS 
    - Android 
 
 
 
   Books / Video Training : Scanning and Enumeration with Kali Linux
Scanning and Enumeration with Kali Linux
Scanning and Enumeration with Kali Linux
.MP4, AVC, 700 kbps, 1920x1080 | English, AAC, 128 kbps, 2 Ch | 3 hours | 800 MB
Instructor: Sean-Philip Oriyano

Kali Linux contains a large amount of penetration testing tools from various different niches of the security and forensics fields. The Kali Linux penetration testing platform contains a vast array of tools and utilities, from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems.

This course will explore the different types of applications and commands to be run on a remote system based on types of goals that an attacker wishes to accomplish. It will cover how to extract useful information from a target that has been located. This course will teach the viewers I details about enum4linux with which one will be able to extract useful information. One will be able to explore the amap tool. This tool can be used to to identify services running on non-standard ports. As you go ahead, this course will teach one how to extract useful information from a target that they have located. The viewers will also be taught how to Discover non-contiguous IP blocks using dnsenum and how to scan with Nikto.
This is the logical follow up to information gathering where we take the information we have gathered and then use that to more closely investigate a target.
What You Will Learn
Gain information about a targeted network to identify the nature of the environment being tested
Identify services running on non-standard ports using amap
Use enum4linux to extract useful information
Make use of the types of applications and commands to run on a remote system
Work with network routers and see how to map them
Find internal hosts, identify internal services, and locate directory services
Perform basic scans using nmap
Grab banners with nmap
Detect services and get to know detection methods
Use NSE scripts in nmap

Buy Premium Account To Get Resumable Support & Max Speed




Links are Interchangeable - No Password
 

 

Back to Top