Ethical Hacking: Scanning Networks
Pluralsight is not an official partner or accredited training center of EC-Council. You know how to recon your target, now it's time to learn how to dig around what you've found for important, relevant data in preparation for your attack.
What you'll learn
Pluralsight is not an official partner or accredited training center of EC-Council. So, after reconnaissance, we need to scan for basics, kind of like knocking on all the doors to see who is home and what they look like. Then, when you find a machine that's "live", we need to get to know it really well, asking some rather personal questions like, "what OS are you running?" or "what applications are you running?" and "which ports are listening on the network?". We'll go over all you'll need to know for the exam regarding scanning, and play with some pretty fun tools along the way. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Table of contents
- Vulnerability Scanning and Drawing Out the Network 2m
- What Is Vulnerability Scanning 4m
- Types of Scanners 3m
- How Does Vulnerability Scanning Work 6m
- The Gears of Vulnerability Scanners 3m
- Vulnerability Scanning Tools 5m
- Be Aware Of... 3m
- Tools, Tools, and More Tools 3m
- DEMO: Vulnerability Scanning with Nessus 14m
- Why Draw Out the Network 3m
- DEMO: Mapping with The Dude 8m
- Summary 1m