MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Ethical Hacking: Enumeration

Course Summary

Now that we've found out "live" systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data such as usernames, computer names, network share, and more. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking


  • +

    Course Syllabus

    Enumeration Explained & the Techniques Used
    - 17m 41s

    —Introduction 1m 32s
    —Enumeration Explained 4m 32s
    —The Techniques of Enumeration 6m 32s
    —Know Your Ports and Services 3m 53s
    —Summary 1m 10s
    Enumerating via Defaults & NetBIOS
    - 47m 29s

    —Introduction to Enumerating via Defaults & NetBIOS 2m 28s
    —Defaults: Your Biggest Security Issue 8m 47s
    —What Is NetBIOS? - a Review 1m 48s
    —DEMO: Using Built-in Commands 14m 8s
    —DEMO: Pulling SID's and User Accounts 10m 0s
    —DEMO: NetBIOS Enumerator & SuperScan 8m 31s
    —Summary 1m 43s
    Enumerating via SNMP
    - 15m 55s
    Enumerating via LDAP
    - 16m 46s
    Enumerating via NTP
    - 10m 34s
    Enumerating via SMTP
    - 18m 39s
    Enumerating via DNS
    - 20m 46s
    Linux Isn't Safe Either
    - 18m 27s
    Countermeasures for Enumeration
    - 13m 38s


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top