Video description
A carefully tailored and structured course to make you an expert in Nmap in just 6.5 hours
About This Video
- Gain a solid understanding of Nmap
- Learn modern techniques to map and scan the network
- Learn how to generate outputs and reports with WebMap
In Detail
Network scanning and enumeration have become an increasingly important aspect of penetration tests over the last couple of years. Organizations now have a complex network of assets storing sensitive and valuable data. To test the security posture of the organization, conducting effective network scanning and enumeration of the organization's network is mandatory. This course will help you become an expert in Nmap quickly and easily.
The course starts by showing you the steps for setting up the working and then highlights the importance of Nmap for network scanning. Next, you will grasp the fundamental concepts of networking, such as port scanning, the Open Systems Interconnection (OSI) model, network layer, and transport layer. Moving along, you will learn how to discover hosts using pings and understand advanced scanning topics that will help you to set up your own virtual hacking lab. Next, you will learn techniques to detect and evade firewalls and become familiar with the Nmap Scripting Engine (NSE). Finally, you will find out the role of enumeration services, such as File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Doman Name System (DNS), HyperText Transfer Protocol (HTTP), Server Message Block (SMB), and MySQL in network scanning.
By the end of this course, you will have all the key skills needed to use Nmap for penetration testing.
Who this book is for
If you are a penetration tester, network administrator, or system administrator, who is looking to master Nmap for discovering hosts and services on a computer network, this course is for you. Basic knowledge and understanding of the Linux terminal are needed to get started with this course.
Publisher resources
Table of contents
- Chapter 1 : Introduction
- Chapter 2 : Networking Fundamentals
-
Chapter 3 : Host Discovery
- Ping Sweep and Don't Ping
- Transmission Control Protocol (TCP) SYN Ping
- Transmission Control Protocol (TCP) ACK Ping
- User Datagram Protocol (UDP) Ping Scan
- Address Resolution Protocol (ARP) Ping
- Internet Control Message Protocol (ICMP) ECHO Ping and ICMP Timestamp Ping
- Internet Protocol (IP) Protocol Ping
- Traceroute and Reverse Doman Name System (DNS) Resolution
-
Chapter 4 : Advanced Scanning
- Setting up Our Virtual Hacking Lab
- Metasploitable3 Prebuilt Virtual Machine (VM) Images
- Default Nmap Scan
- Port Scanning Options and Ranges
- Transmission Control Protocol (TCP) Connect Scan (-sT)
- Stealth (SYN) Scanning (-sS)
- Operating System Detection and Service Detection
- Aggressive Scanning
- User Datagram Protocol (UDP) Scanning
- The Reason Option
- The Fast Scan
- Verbosity, Output, and logging
- FIN, XMAS, and NULL Scanning
- WebMap - Web Dashboard for Nmap
- Chapter 5 : Firewall Detection and Evasion
- Chapter 6 : Scan Timing and Performance
- Chapter 7 : Nmap Scripting Engine (NSE)
-
Chapter 8 : Service Enumeration
- Banner Grabbing with Nmap
- Whois and Traceroute Geo-location Enumeration
- File Transfer Protocol (FTP) Enumeration
- Simple Mail Transfer Protocol (SMTP) Enumeration
- Doman Name System (DNS) Enumeration - Zone-transfer and DNS Bruteforce
- HTTP Enumeration - HTTP Methods
- HTTP Enumeration - Finding Hidden Files and Directories
- HTTP Enumeration - Web Application Firewall (WAF) Detection and Fingerprinting
- Server Message Block (SMB) Enumeration
- MySQL Enumeration
- Vulnerability Scanning with Nmap
Product information
- Title: Nmap for Penetration Testing: From Beginner to Advanced [Updated for 2021]
- Author(s):
- Release date: January 2021
- Publisher(s): Packt Publishing
- ISBN: 9781801074421
You might also like
video
Python Fundamentals
51+ hours of video instruction. Overview The professional programmer’s Deitel® video guide to Python development with …
book
Clean Code: A Handbook of Agile Software Craftsmanship
Even bad code can function. But if code isn't clean, it can bring a development organization …
book
Linux Basics for Hackers
If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for …
book
40 Algorithms Every Programmer Should Know
Learn algorithms for solving classic computer science problems with this concise guide covering everything from fundamental …