Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

Ethical Hacking: Enumeration

via Pluralsight

Overview

The third phase attackers perform on a target is enumerating accounts and services. This course will teach you skills attackers use for enumeration that needed for the Certified Ethical Hacking exam.

To truly compromise a system, making sure you know what OS, accounts, and services that are running is key. In this course, Ethical Hacking: Enumeration, you’ll learn to identify accounts and services through enumeration. First, you’ll explore how to use NetBIOS to expose intel. Next, you’ll discover how to use LDAP to expose user accounts and other protocols to complete your enumeration tasks. Finally, you’ll learn the countermeasures to thwart enumeration attacks. When you’re finished with this course, you’ll have the skills and knowledge of enumeration techniques needed for the Certified Ethical Hacking exam.

Syllabus

  • Course Overview 1min
  • Discussing Enumeration and the Techniques Used 17mins
  • Defaults and NetBIOS 35mins
  • Capture SNMP Enumeration 12mins
  • Demonstrating LDAP Enumeration 12mins
  • Examining NTP and NFS Enumeration 7mins
  • Exploring SMTP Enumeration 12mins
  • Employing DNS Enumeration 15mins
  • Acquiring Intel from Other Enumeration Techniques 24mins
  • Discovering Enumeration Countermeasures 12mins
  • Domain Summary 3mins

Taught by

Dale Meredith

Reviews

4.9 rating at Pluralsight based on 70 ratings

Start your review of Ethical Hacking: Enumeration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.