Book Image

Getting Started with Pentesting [Video]

By : Tajinder Kalsi
Book Image

Getting Started with Pentesting [Video]

By: Tajinder Kalsi

Overview of this book

<p><span id="description" class="sugar_field">With advanced hackers and threats always on the increase in our virtual world, proficiency with pentesting is an absolute necessity for individuals and organizations trying to protect their systems. </span></p> <p><span id="description" class="sugar_field">The methods and techniques contained in this video will provide you with a powerful arsenal of best practices to increase your penetration testing success. This course presents step-by-step instruction in information gathering and intelligence, and will allow you to gather the required information on the targets you are testing. The Exploitation and Post-Exploitation sections will supply you with the tools you need. The challenges at the end of each chapter are designed to test you and provide real-world situations to hone and perfect your penetration testing skills. </span></p> <h2><span class="sugar_field">Style and Approach</span></h2> <p><span class="sugar_field"><span id="trade_selling_points_c" class="sugar_field">Step-by-step instructions with challenges designed to test your skills and impart proficiency</span></span></p>
Table of Contents (5 chapters)
Chapter 5
Scanning – Enumerating Target
Content Locked
Section 6
Banner Grabbing with Netcat
While performing pen testing of a network, we may want to read from or write to the network connection using TCP or UDP. Netcat is a feature-rich utility which can be used to debug or investigate about the network. - Understand the features of Netcat - Understand usage of Netcat with few examples - Perform Banner grabbing using Netcat