Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Pluralsight is not an official partner or accredited training center of
EC-Council. Now that we've found out "live" systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data.
Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Topics:
Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Topics:
- Enumeration Explained & the Techniques Used
- Enumerating via Defaults & NetBIOS
- Enumerating via SNMP
- Enumerating via LDAP
- Enumerating via NTP
- Enumerating via SMTP
- Enumerating via DNS
- Oh, There's More
- Countermeasures for Enumeration