Learning Outcome:
Requirement:
Course Curriculum
Recipe 2: Active Information Gathering & Enumeration; the Right Way
Available in
days
days
after you enroll
-
Start
Understand TCP & UDP comm
(10:51)
-
Start
The Host Discovery techniques
(19:00)
-
Start
Port Scanning and Service Enumeration
(17:45)
-
Start
SMB Enumeration
(12:47)
-
Start
FTP and SMTP enum
(9:01)
-
Start
Enumerating the Webserver & Application
(16:05)
-
Start
The Swiss Army Knife (Netcat)
(9:05)
-
Start
Cheat Sheet
Recipe 2.1: Sniffing the Network using Wireshark
Available in
days
days
after you enroll
-
Start
The OSI Model An Overview
(8:25)
-
Start
What is wireshark and how to setup it on
(1:57)
-
Start
Wireshark basis (explain the main window & options) and what packets can be captured
(10:41)
-
Start
The right steps to capture the traffic and how to use filters
(8:19)
-
Start
Analyze the packets (display filters as well)
(6:32)
-
Start
Extracting files from the captured traffic
(2:33)
-
Start
Following TCP Stream
(3:13)
-
StartUnderstand TCP & UDP comm (10:51)
-
StartThe Host Discovery techniques (19:00)
-
StartPort Scanning and Service Enumeration (17:45)
-
StartSMB Enumeration (12:47)
-
StartFTP and SMTP enum (9:01)
-
StartEnumerating the Webserver & Application (16:05)
-
StartThe Swiss Army Knife (Netcat) (9:05)
-
StartCheat Sheet
-
StartThe OSI Model An Overview (8:25)
-
StartWhat is wireshark and how to setup it on (1:57)
-
StartWireshark basis (explain the main window & options) and what packets can be captured (10:41)
-
StartThe right steps to capture the traffic and how to use filters (8:19)
-
StartAnalyze the packets (display filters as well) (6:32)
-
StartExtracting files from the captured traffic (2:33)
-
StartFollowing TCP Stream (3:13)
Your Instructor
Irfan Shakeel
Irfan Shakeel, the founder of the ehacking project, also hosts classes at EH Academy. He has found many vulnerabilities in the world’s known platforms, he has been providing IT security training since 2010. You might have read his articles and opinion on IBM Developers, Infosec Institute, AlienVault, EH Academy and other known blogs. Follow him on Twitter, LinkedIn and Quora.
Reviews
Your Instructor
Irfan Shakeel, the founder of the ehacking project, also hosts classes at EH Academy. He has found many vulnerabilities in the world’s known platforms, he has been providing IT security training since 2010. You might have read his articles and opinion on IBM Developers, Infosec Institute, AlienVault, EH Academy and other known blogs. Follow him on Twitter, LinkedIn and Quora.
Course Curriculum
-
StartUnderstand TCP & UDP comm (10:51)
-
StartThe Host Discovery techniques (19:00)
-
StartPort Scanning and Service Enumeration (17:45)
-
StartSMB Enumeration (12:47)
-
StartFTP and SMTP enum (9:01)
-
StartEnumerating the Webserver & Application (16:05)
-
StartThe Swiss Army Knife (Netcat) (9:05)
-
StartCheat Sheet
-
StartThe OSI Model An Overview (8:25)
-
StartWhat is wireshark and how to setup it on (1:57)
-
StartWireshark basis (explain the main window & options) and what packets can be captured (10:41)
-
StartThe right steps to capture the traffic and how to use filters (8:19)
-
StartAnalyze the packets (display filters as well) (6:32)
-
StartExtracting files from the captured traffic (2:33)
-
StartFollowing TCP Stream (3:13)