Companies Home Search Profile

Nmap for Penetration Testing: From Beginner to Advanced [Updated for 2021]

Focused View

HackerSploit Academy

5:03:20

10 View
  • 01.01-introduction to nmap.mp4
    07:18
  • 01.02-setting up our working environment.mp4
    09:33
  • 01.03-compiling nmap from source.mp4
    07:03
  • 01.04-importance of nmap for network scanning.mp4
    03:56
  • 02.01-port scanning.mp4
    07:43
  • 02.02-the open systems interconnection (osi) model.mp4
    06:09
  • 02.03-network layer.mp4
    06:42
  • 02.04-transport layer.mp4
    08:02
  • 02.05-transmission control protocol (tcp) header flags and tcp 3-way handshake.mp4
    07:42
  • 03.01-ping sweep and dont ping.mp4
    12:15
  • 03.02-transmission control protocol (tcp) syn ping.mp4
    08:48
  • 03.03-transmission control protocol (tcp) ack ping.mp4
    04:06
  • 03.04-user datagram protocol (udp) ping scan.mp4
    03:10
  • 03.05-address resolution protocol (arp) ping.mp4
    04:30
  • 03.06-internet control message protocol (icmp) echo ping and icmp timestamp ping.mp4
    07:38
  • 03.07-internet protocol (ip) protocol ping.mp4
    03:51
  • 03.08-traceroute and reverse doman name system (dns) resolution.mp4
    04:45
  • 04.01-setting up our virtual hacking lab.mp4
    08:34
  • 04.02-metasploitable3 prebuilt virtual machine (vm) images.mp4
    01:16
  • 04.03-default nmap scan.mp4
    06:40
  • 04.04-port scanning options and ranges.mp4
    08:17
  • 04.05-transmission control protocol (tcp) connect scan (-st).mp4
    05:10
  • 04.06-stealth (syn) scanning (-ss).mp4
    03:53
  • 04.07-operating system detection and service detection.mp4
    11:25
  • 04.08-aggressive scanning.mp4
    07:36
  • 04.09-user datagram protocol (udp) scanning.mp4
    04:30
  • 04.10-the reason option.mp4
    04:55
  • 04.11-the fast scan.mp4
    03:00
  • 04.12-verbosity output and logging.mp4
    11:50
  • 04.13-fin xmas and null scanning.mp4
    12:33
  • 04.14-webmap-web dashboard for nmap.mp4
    14:53
  • 05.01-firewall detection with ack probing.mp4
    04:49
  • 05.02-packet fragmentation.mp4
    02:25
  • 05.03-specifying maximum transmission unit (mtu).mp4
    03:15
  • 05.04-using ip decoys.mp4
    05:02
  • 05.05-spoofing mac addresses.mp4
    02:46
  • 06.01-timing templates.mp4
    09:33
  • 06.02-parallelism.mp4
    05:23
  • 06.03-host timeout.mp4
    05:29
  • 06.04-scan delay.mp4
    10:23
  • 07.01-introduction to the nmap scripting engine (nse).mp4
    06:29
  • 07.02-nmap scripting engine (nse) syntax.mp4
    10:58
  • 07.03-script categories.mp4
    07:17
  • 08.01-banner grabbing with nmap.mp4
    05:12
  • 08.02-whois and traceroute geo-location enumeration.mp4
    06:36
  • 9781801074421 Code.zip
  • Description


    Network scanning and enumeration have become an increasingly important aspect of penetration tests over the last couple of years. Organizations now have a complex network of assets storing sensitive and valuable data. To test the security posture of the organization, conducting effective network scanning and enumeration of the organization's network is mandatory. This course will help you become an expert in Nmap quickly and easily. The course starts by showing you the steps for setting up the working and then highlights the importance of Nmap for network scanning. Next, you will grasp the fundamental concepts of networking, such as port scanning, the Open Systems Interconnection (OSI) model, network layer, and transport layer. Moving along, you will learn how to discover hosts using pings and understand advanced scanning topics that will help you to set up your own virtual hacking lab. Next, you will learn techniques to detect and evade firewalls and become familiar with the Nmap Scripting Engine (NSE). Finally, you will find out the role of enumeration services, such as File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Doman Name System (DNS), HyperText Transfer Protocol (HTTP), Server Message Block (SMB), and MySQL in network scanning. By the end of this course, you will have all the key skills needed to use Nmap for penetration testing. All the resources for this course are available at https://github.com/PacktPublishing/Nmap-for-Penetration-Testing-From-Beginner-to-Advanced-Updated-for-2021

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    HackerSploit Academy
    HackerSploit Academy
    Instructor's Courses
    HackerSploit is aimed at protecting companies and businesses from the ever-growing threat of hackers, data breaches, malware, and ransomware. They believe in achieving this by providing essential training in the protection of systems, and by providing industry-standard defense solutions protecting web applications to enterprise networks. They also offer individual and corporate training packages in Infosec, penetration testing and Red Team Operations, web application security, and cybersecurity awareness. So far, they have trained over 500,000 students in ethical hacking, penetration testing, and Linux system administration.
    Packt is a publishing company founded in 2003 headquartered in Birmingham, UK, with offices in Mumbai, India. Packt primarily publishes print and electronic books and videos relating to information technology, including programming, web design, data analysis and hardware.
    • language english
    • Training sessions 45
    • duration 5:03:20
    • Release Date 2024/03/15