Ethical Hacking: Scanning Networks
Pluralsight
Course Summary
You know how to recon your target, now it's time to learn how to dig around what you've found for important, relevant data in preparation for your attack. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Description
So, after reconnaissance, we need to scan for basics, kind of like knocking on all the doors to see who is home and what they look like. Then, when you find a machine that's "live", we need to get to know it really well, asking some rather personal questions like, "what OS are you running?" or "what applications are you running?" and "which ports are listening on the network?". We'll go over all you'll need to know for the exam regarding scanning, and play with some pretty fun tools along the way. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Syllabus
Overview of Scanning- 22m 48s
—Overview of Scanning 3m 36s
—What Is Scanning? 2m 18s
—Types of Scanning 5m 15s
—What's the Goal 4m 14s
—What Techniques Are Used? 2m 45s
—What Tools Are Used 2m 35s
—Summary 2m 2sUnderstanding the 3-way Handshake- 21m 8s
—Introduction 2m 0s
—TCP Communications 4m 6s
—UDP Communications 3m 42s
—TCP Header Flags 3m 44s
—Demo: Watch The 3-way Handshake 4m 41s
—What If... 1m 22s
—Summary 1m 31sChecking for "Live" Systems and Their Open Ports- 32m 5sTypes of Scanning- 44m 18sBanner Grabbing and OS Fingerprinting- 30m 5sVulnerability Scanning and Drawing Out the Network- 55m 51sPreparing Proxies and Other Anonymizing Techniques- 19m 41s