Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Scanning and Enumeration with Kali Linux

Course Cover
compare button icon

Course Features

icon

Duration

3.3 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

3.3 hours

Course Description

Use various scanning tools to extract information from a target

About This Video

  • This comprehensive guide explains how to find information about a target using various sources, such as service discovery, directory enumeration and technology mapping.
  • Remotely run applications and explore the network around a compromised server
  • Re-use some of the tools and learn new techniques about the target environment.

Kali Linux includes many penetration testing tools that are relevant to different areas of security and forensics. Kali Linux's penetration testing platform includes a wide range of utilities and tools, from information gathering to final report, that allow IT professionals and security professionals to assess the security and integrity of their systems.

This course will cover the various types of commands and applications that can be run on remote systems based on the goals an attacker wants to achieve. It will also cover how to extract useful information about a target once it has been identified. This course will provide information about enum4linux, which will allow one to extract useful information. You will be able explore the amap tool. This tool can be used for identifying services that are running on non-standard ports. This course will show you how to extract useful information from a target they have found. Viewers will also learn how to scan with Nikto and how to discover non-contiguous IP blocks using DNSenum.

This is the logical next step to information gathering. We take the information we have collected and use it to investigate a target more closely.

Downloading the example code for this course: You can download the example code files for this course on GitHub at the following link: https://github.com/PacktPublishing/Scanning-and-Enumeration-with-Kali-Linux-v-. If you require support please email: customercare@packt.com

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

A comprehensive guide that illustrates how to gain information about a target from various sources such as directory enumeration, service discovery, and technology mapping

Revisit some of the previous tools along with using new techniques to learn about the target environment

Run remote applications and explore the network around a compromised host

Course Cover