Companies Home Search Profile

Ethical Hacking: Web Enumeration

Focused View

Peter A

41:07

12 View
  • 1. Introduction.mp4
    03:25
  • 2. Manual Scanning.mp4
    03:06
  • 3. Wordlists.mp4
    01:50
  • 4. Gobuster dir scan.mp4
    07:43
  • 5. Gobuster file scan.mp4
    04:03
  • 6. Gobuster DNS scan.mp4
    05:11
  • 7. WPScan.mp4
    09:43
  • 8. Nikto.mp4
    06:06
  • Description


    Scan your target before hacking

    What You'll Learn?


    • Manual Scanning
    • Scanning website for hidden directories
    • Scanning website for hidden files
    • Scanning for hidden subdomains
    • Scanning WordPress blogs
    • Scanning Servers

    Who is this for?


  • Beginner Ethical Hackers
  • Software Developers
  • Sysadmins
  • Devops
  • What You Need to Know?


  • No prior experience required
  • More details


    Description

    web enumeration is a techniques hackers use when targeting web servers and web sites. When attempting to hack an application with a vulnerabilty, you first have to find out what files, subdomains or directories the applications are vulnerable to. On top of that, you may find hidden files that could give you access to the file server. Perhaps you can access SSH keys, pdfs or find hidden directories. It might be there is a vulnerable app running on one of the sub domains. There are many ways the server could be accessible and web enumeration is the first step.

    In this course you will learn how to scan for directories, files, subdomains but also how to scan blogs made with wordpress for vulnerabilities. While you can do manual scanning, that quickly becomes cumbersome. In this course we explain how you can do automated scans on your target server.

    This is a beginners course for those interested in Ethical Hacking or Cyber Security. You don't need any prior knowledge when doing this course, but you should have Kali Linux at hands. Kali Linux is a computer system that contains many hacking tools, sometimes it's simply called Kali. It can be downloaded for free as a Live USB or Virtualbox image, there's also a cloud option. While you can install the tools manually, there are so many hacking tools that it's easier to use a dedicated Linux system like Kali.





    Who this course is for:

    • Beginner Ethical Hackers
    • Software Developers
    • Sysadmins
    • Devops

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Ethical Hacker with Software Development background. I first started programming long ago as a hobby and along the way learned many things. I've programmed in basic, c++, java and many other languages. I'm programming as a hobby. I've used a variety of operating systems and also database systems. I'm here to share my experience. Then I got into Ethical Hacking
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 8
    • duration 41:07
    • Release Date 2024/03/12

    Courses related to Ethical Hacking

    Subtitle
    Golang Hacking
    UdemyGolang Hacking
    7:56:32
    English subtitles
    03/25/2023
    Subtitle
    Ethical Hacking: Exam Review and Tips