Book Image

Getting Started with Pentesting [Video]

By : Tajinder Kalsi
Book Image

Getting Started with Pentesting [Video]

By: Tajinder Kalsi

Overview of this book

<p><span id="description" class="sugar_field">With advanced hackers and threats always on the increase in our virtual world, proficiency with pentesting is an absolute necessity for individuals and organizations trying to protect their systems. </span></p> <p><span id="description" class="sugar_field">The methods and techniques contained in this video will provide you with a powerful arsenal of best practices to increase your penetration testing success. This course presents step-by-step instruction in information gathering and intelligence, and will allow you to gather the required information on the targets you are testing. The Exploitation and Post-Exploitation sections will supply you with the tools you need. The challenges at the end of each chapter are designed to test you and provide real-world situations to hone and perfect your penetration testing skills. </span></p> <h2><span class="sugar_field">Style and Approach</span></h2> <p><span class="sugar_field"><span id="trade_selling_points_c" class="sugar_field">Step-by-step instructions with challenges designed to test your skills and impart proficiency</span></span></p>
Table of Contents (5 chapters)
Chapter 5
Scanning – Enumerating Target
Content Locked
Section 3
Scan Types – Nmap
At times, using multiple scan type of Nmap may not yield much information about any firewall before the target device. Nmap has more advanced scan types for such situations. Multiple options can be combined to run custom scan. - Running scan using multiple scan options in one command - Next run a detailed scan for any particular port or service only - Cloak the scan with decoys to perform stealth scan