×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Recipe 2: Active Information Gathering & Enumeration; the Right Way
Recipe 2: Active Information Gathering & Enumeration; the Right Way
Understand TCP & UDP comm (10:51)
The Host Discovery techniques (19:00)
Port Scanning and Service Enumeration (17:45)
SMB Enumeration (12:47)
FTP and SMTP enum (9:01)
Enumerating the Webserver & Application (16:05)
The Swiss Army Knife (Netcat) (9:05)
Cheat Sheet
Recipe 2.1: Sniffing the Network using Wireshark
The OSI Model An Overview (8:25)
What is wireshark and how to setup it on (1:57)
Wireshark basis (explain the main window & options) and what packets can be captured (10:41)
The right steps to capture the traffic and how to use filters (8:19)
Analyze the packets (display filters as well) (6:32)
Extracting files from the captured traffic (2:33)
Following TCP Stream (3:13)
Wireshark basis (explain the main window & options) and what packets can be captured
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock