Ethical Hacking: Enumeration

Go to class
Write Review

Free Online Course: Ethical Hacking: Enumeration provided by LinkedIn Learning is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Ethical Hacking: Enumeration is taught by Malcolm Shore.

Overview
  • Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.

Syllabus
  • Introduction

    • Starting your testing with enumeration
    • What you need to know
    • Disclaimer
    1. Basics of Enumeration
    • What is enumeration?
    • Understanding contexts
    • Working with contexts
    • Understanding NetBIOS, SMB, SAMBA, and RPC
    2. Local Host Enumeration
    • Profiling a Unix host
    • Profiling a Windows host
    • Investigating the Windows network interface
    • Investigating the Linux network interface
    3. Enumeration Remote Hosts
    • Enumerating host services
    • Enumerating SMB from Linux: Episode 1
    • Enumerating SMB from Linux: Episode 2
    • Enumerating SMB from Linux: Episode 3
    • Enumerating SMB from Windows: Episode 1
    • Enumerating SMB from Windows: Episode 2
    • Enumerating using SNMP
    • Enumerating with RPC
    • Using WMI to enumerate Windows
    • Enumeration using Finger
    • Remote enumeration using PowerShell
    4. Enumerating Web Apps
    • What is that web server?
    • Enumerating a website with Nikto
    • Enumerating webpages
    • Enumerating hidden webpages
    5. Enumerating the Internet
    • Tracing routes across the internet routes
    • Using Shodan
    • Scan the internet with ZMap
    6. Enumerating Cloud
    • Enumeration of the cloud
    • Enumerating cloud policies
    • Enumerating cloud compute resources
    • Enumerating cloud storage resources
    7. Other Enumeration
    • Scanning with SuperScan
    • Scanning with NetScanTools Pro
    • Enumerating LDAP
    • Checking for SMTP users
    Conclusion
    • Next steps