Attackers use scanning and enumeration to determine what live systems are on the network (host discovery) and additional information about those systems, like the operating system in use and software version. With vulnerability scanning, an attacker attempts to locate specific weaknesses in system software. Specifically, the attacker is hoping to find known vulnerabilities (CVE) that they can easily exploit. This course is designed to be predominantly hands-on and covers the theory of scanning, enumeration, and vulnerabilities at a high-level.
Overview
Syllabus
- Introduction
- Scanning & Enumeration Introduction
- Check for Live Systems & Ports
- Checking for Live Systems Lab Part 1
- Checking for Live Systems Lab Part 2
- Performing a Check for Live Systems
- Checking for Open Ports Lab Part 1
- Checking for Open Ports Lab Part 2
- Performing a Check for Open Ports
- Scanning
- Scanning Introduction
- Scanning with with NMAP Half Connect Scan
- Scanning with NMAP Full Connect Scan
- Scanning with XMAS Scan Part 1
- Scanning with XMAS Scan Part 2
- Scanning with NMAP ACK Scan
- Scanning with NMAP ACK Scan and Windows Firewall
- Scanning with hping3 and SYN Scan
- Scanning with hping3 and ACK Scan
- Scanning with hping3 and XMAS Scan
- Scanning with hping3, ACK Scan, and Windows Firewall
- Implementing Scanning Techniques
- Fingerprinting & Banner Grabbing
- OS Fingerprinting
- OS Fingerprinting
- Banner Grabbing
- Banner Grabbing
- Enumeration Tools
- Zenmap
- Dig and Finger Commands
- Using Enumeration Tools
- Vulnerabilities
- Vulnerability Scanner Setup and Configuration of Core Impact Part 1
- Vulnerability Scanner Setup and Configuration of Core Impact Part 2
- Vulnerability Scanner Set-up and Configuration
- Vulnerability Scanner Setup and Configuration of OpenVAS Part 1
- Vulnerability Scanner Setup and Configuration of OpenVAS Part 2
- Vulnerability Scanner Set-up and Configuration, Pt. 2
- Conclusion
- Vulnerability Scan Assessment Overview
- Vulnerability Scan
- Scanning, Enumerations, & Vulnerabilities Conclusion
Taught by
Ken Underhill