Video description
Network scanning and enumeration have become an increasingly important aspect of penetration tests over the last couple of years. Organizations now have a complex network of assets storing sensitive and valuable data. To test the security posture of the organization, conducting effective network scanning and enumeration of the organization's network is mandatory. This course will help you become an expert in Nmap quickly and easily.
The course starts by showing you the steps for setting up the working and then highlights the importance of Nmap for network scanning. Next, you will grasp the fundamental concepts of networking, such as port scanning, the Open Systems Interconnection (OSI) model, network layer, and transport layer. Moving along, you will learn how to discover hosts using pings and understand advanced scanning topics that will help you to set up your own virtual hacking lab. Next, you will learn techniques to detect and evade firewalls and become familiar with the Nmap Scripting Engine (NSE). Finally, you will find out the role of enumeration services, such as File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Doman Name System (DNS), HyperText Transfer Protocol (HTTP), Server Message Block (SMB), and MySQL in network scanning.
By the end of this course, you will have all the key skills needed to use Nmap for penetration testing.
What You Will Learn
- Distinguish between the network and transport layers
- Work with different types of pings, such as Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Address Resolution Protocol (ARP)
- Explore advanced scanning methods, such as aggressive, UDP, and fast scan
- Perform firewall detection with Nmap using ACK probing
- Learn the Nmap Scripting Engine (NSE) syntaxes
- Perform vulnerability scanning with Nmap
Audience
If you are a penetration tester, network administrator, or system administrator, who is looking to master Nmap for discovering hosts and services on a computer network, this course is for you. Basic knowledge and understanding of the Linux terminal are needed to get started with this course.
About The Author
HackerSploit Academy: HackerSploit is aimed at protecting companies and businesses from the ever-growing threat of hackers, data breaches, malware, and ransomware. They believe in achieving this by providing essential training in the protection of systems, and by providing industry-standard defense solutions protecting web applications to enterprise networks. They also offer individual and corporate training packages in Infosec, penetration testing and Red Team Operations, web application security, and cybersecurity awareness. So far, they have trained over 500,000 students in ethical hacking, penetration testing, and Linux system administration.
Table of contents
- Chapter 1 : Introduction
- Chapter 2 : Networking Fundamentals
-
Chapter 3 : Host Discovery
- Ping Sweep and Don't Ping
- Transmission Control Protocol (TCP) SYN Ping
- Transmission Control Protocol (TCP) ACK Ping
- User Datagram Protocol (UDP) Ping Scan
- Address Resolution Protocol (ARP) Ping
- Internet Control Message Protocol (ICMP) ECHO Ping and ICMP Timestamp Ping
- Internet Protocol (IP) Protocol Ping
- Traceroute and Reverse Doman Name System (DNS) Resolution
-
Chapter 4 : Advanced Scanning
- Setting up Our Virtual Hacking Lab
- Metasploitable3 Prebuilt Virtual Machine (VM) Images
- Default Nmap Scan
- Port Scanning Options and Ranges
- Transmission Control Protocol (TCP) Connect Scan (-sT)
- Stealth (SYN) Scanning (-sS)
- Operating System Detection and Service Detection
- Aggressive Scanning
- User Datagram Protocol (UDP) Scanning
- The Reason Option
- The Fast Scan
- Verbosity, Output, and logging
- FIN, XMAS, and NULL Scanning
- WebMap - Web Dashboard for Nmap
- Chapter 5 : Firewall Detection and Evasion
- Chapter 6 : Scan Timing and Performance
- Chapter 7 : Nmap Scripting Engine (NSE)
-
Chapter 8 : Service Enumeration
- Banner Grabbing with Nmap
- Whois and Traceroute Geo-location Enumeration
- File Transfer Protocol (FTP) Enumeration
- Simple Mail Transfer Protocol (SMTP) Enumeration
- Doman Name System (DNS) Enumeration - Zone-transfer and DNS Bruteforce
- HTTP Enumeration - HTTP Methods
- HTTP Enumeration - Finding Hidden Files and Directories
- HTTP Enumeration - Web Application Firewall (WAF) Detection and Fingerprinting
- Server Message Block (SMB) Enumeration
- MySQL Enumeration
- Vulnerability Scanning with Nmap
Product information
- Title: Nmap for Penetration Testing: From Beginner to Advanced [Updated for 2021]
- Author(s):
- Release date: January 2021
- Publisher(s): Packt Publishing
- ISBN: 9781801074421
You might also like
video
Security Penetration Testing The Art of Hacking Series LiveLessons
10 Hours of Expert Video Instruction Overview This course is a complete guide to help you …
book
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud …
video
Learning Path: Certified Ethical Hacker CEH Complete Video Course
Duration More Than 10 Hours of Video Instruction Overview Learn everything you need to know to …
video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced
Are you looking to pursue a career in cybersecurity and want to master the art of …