Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.
Overview
Syllabus
Introduction
- Starting your testing with enumeration
- What you need to know
- Disclaimer
- What is enumeration?
- Understanding contexts
- Working with contexts
- Understanding NetBIOS, SMB, SAMBA, and RPC
- Profiling a Unix host
- Profiling a Windows host
- Investigating the Windows network interface
- Investigating the Linux network interface
- Enumerating host services
- Enumerating SMB from Linux: Episode 1
- Enumerating SMB from Linux: Episode 2
- Enumerating SMB from Linux: Episode 3
- Enumerating SMB from Windows: Episode 1
- Enumerating SMB from Windows: Episode 2
- Enumerating using SNMP
- Enumerating with RPC
- Using WMI to enumerate Windows
- Enumeration using Finger
- Remote enumeration using PowerShell
- What is that web server?
- Enumerating a website with Nikto
- Enumerating webpages
- Enumerating hidden webpages
- Tracing routes across the internet routes
- Using Shodan
- Scan the internet with ZMap
- Enumeration of the cloud
- Enumerating cloud policies
- Enumerating cloud compute resources
- Enumerating cloud storage resources
- Scanning with SuperScan
- Scanning with NetScanTools Pro
- Enumerating LDAP
- Checking for SMTP users
- Digging into DNS
- Enumerating netbios
- Taking time to enumerate
- Next steps
Taught by
Malcolm Shore