Ethical Hacking: Enumeration

Pluralsight
Course Summary
Now that we've found out "live" systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data such as usernames, computer names, network share, and more. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Description
Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Syllabus
Enumeration Explained & the Techniques Used- 17m 41s
—Introduction 1m 32s
—Enumeration Explained 4m 32s
—The Techniques of Enumeration 6m 32s
—Know Your Ports and Services 3m 53s
—Summary 1m 10sEnumerating via Defaults & NetBIOS- 47m 29s
—Introduction to Enumerating via Defaults & NetBIOS 2m 28s
—Defaults: Your Biggest Security Issue 8m 47s
—What Is NetBIOS? - a Review 1m 48s
—DEMO: Using Built-in Commands 14m 8s
—DEMO: Pulling SID's and User Accounts 10m 0s
—DEMO: NetBIOS Enumerator & SuperScan 8m 31s
—Summary 1m 43sEnumerating via SNMP- 15m 55sEnumerating via LDAP- 16m 46sEnumerating via NTP- 10m 34sEnumerating via SMTP- 18m 39sEnumerating via DNS- 20m 46sLinux Isn't Safe Either- 18m 27sCountermeasures for Enumeration- 13m 38s