Ethical Hacking: Enumeration

Now that we've found out "live" systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data such as usernames, computer names, network share, and more. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Course info
Rating
(126)
Level
Beginner
Updated
September 3, 2015
Duration
2h 59m
Table of contents
Description
Course info
Rating
(126)
Level
Beginner
Updated
September 3, 2015
Duration
2h 59m
Description

Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
More courses by Dale Meredith