Use various scanning tools to extract information from a target
About This Video
- This comprehensive guide explains how to find information about a target using various sources, such as service discovery, directory enumeration and technology mapping.
- Remotely run applications and explore the network around a compromised server
- Re-use some of the tools and learn new techniques about the target environment.
Kali Linux includes many penetration testing tools that are relevant to different areas of security and forensics. Kali Linux's penetration testing platform includes a wide range of utilities and tools, from information gathering to final report, that allow IT professionals and security professionals to assess the security and integrity of their systems.
This course will cover the various types of commands and applications that can be run on remote systems based on the goals an attacker wants to achieve. It will also cover how to extract useful information about a target once it has been identified. This course will provide information about enum4linux, which will allow one to extract useful information. You will be able explore the amap tool. This tool can be used for identifying services that are running on non-standard ports. This course will show you how to extract useful information from a target they have found. Viewers will also learn how to scan with Nikto and how to discover non-contiguous IP blocks using DNSenum.
This is the logical next step to information gathering. We take the information we have collected and use it to investigate a target more closely.
Downloading the example code for this course: You can download the example code files for this course on GitHub at the following link: https://github.com/PacktPublishing/Scanning-and-Enumeration-with-Kali-Linux-v-. If you require support please email: customercare@packt.com