Book Image

Scanning and Enumeration with Kali Linux [Video]

By : Sean-Philip Oriyano
Book Image

Scanning and Enumeration with Kali Linux [Video]

By: Sean-Philip Oriyano

Overview of this book

<p><span id="description" class="sugar_field">Kali Linux contains a large amount of penetration testing tools from various different niches of the security and forensics fields. The Kali Linux penetration testing platform contains a vast array of tools and utilities, from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems.</span></p> <p><span id="description" class="sugar_field">This course will explore the different types of applications and commands to be run on a remote system based on types of goals that an attacker wishes to accomplish. It will cover how to extract useful information from a target that has been located. This course will teach the viewers I details about enum4linux with which one will be able to extract useful information. One will be able to explore the amap tool. This tool can be used to to identify services running on non-standard ports. As you go ahead, this course will teach one how to extract useful information from a target that they have located. The viewers will also be taught how to Discover non-contiguous IP blocks using dnsenum and how to scan with Nikto. </span></p> <p><span id="description" class="sugar_field">This is the logical follow up to information gathering where we take the information we have gathered and then use that to more closely investigate a target</span></p> <h2><span class="sugar_field">Style And Approach</span></h2> <p><span class="sugar_field"><span id="trade_selling_points_c" class="sugar_field">An exhaustive course packed with step-by-step instructions, working examples, and combination of theory followed by hands-on application of a tool. This course is divided into clear chunks focusing on a specific tool, it’s expectations and goals.</span></span></p>
Table of Contents (5 chapters)
Chapter 1
Using nmap to Perform Port Scanning
Content Locked
Section 2
A Quick Look at nmap Basics
Learn the basics of nmap. - Explore the purpose and use of nmap - Understand how to interpret information and analyze output using nmap - Learn the command structure and basic syntax of nmap