From the course: Ethical Hacking: Enumeration
Starting your testing with enumeration
From the course: Ethical Hacking: Enumeration
Starting your testing with enumeration
- [Instructor] When carrying out testing through ethical hacking one of the key activities that directs the testing is a enumeration. The ability to find out everything about a target by enumerating its ports and services, its uses and accounts, it's processes and just about everything that can be exposed and enumerator. Carrying out enumeration well is the real key to success in your certifications and your business assignments. I'm Malcolm Shore and I've spent a career helping governments and businesses protect their systems against cyber attacks. In this course, I'll explore how to enumerate Windows and Linux systems using the tools built into CALI as well as some third party tools. I'll start by explaining enumeration in the context of technical testing and I'll demonstrate the basic Windows and Linux toolsets. I'll then look at the detailed enumeration of special protocols such as SMB, RPC, and SNMP. I'll show how to enumerate websites and databases and how to enumerate the internet as a whole. Finally, I'll demonstrate some key third party tools for enumeration. When you finish this course you'll have a great understanding of how to make your testing effective by properly enumerating the targets. Now let's get started with enumeration.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.