Free
Scanning, Enumeration, and Vulnerabilities
This course covers basic scanning, enumeration, and vulnerability scanning as part of a penetration test.
7
H
47
M
Time
beginner
difficulty
9
ceu/cpe
Course Content
Vulnerability Scan Assessment Overview
Conclusion
Scanning & Enumeration Introduction
Introduction
Checking for Live Systems Lab Part 1
Check for Live Systems & Ports
Scanning Introduction
Scanning
OS Fingerprinting
Fingerprinting & Banner Grabbing
Zenmap
Enumeration Tools
Vulnerability Scan
Conclusion
Checking for Live Systems Lab Part 2
Check for Live Systems & Ports
OS Fingerprinting
Fingerprinting & Banner Grabbing
Dig and Finger Commands
Enumeration Tools
Performing a Check for Live Systems
Check for Live Systems & Ports
Banner Grabbing
Fingerprinting & Banner Grabbing
Using Enumeration Tools
Enumeration Tools
Vulnerability Scanner Set-up and Configuration
Vulnerabilities
Checking for Open Ports Lab Part 1
Check for Live Systems & Ports
Scanning with XMAS Scan Part 1
Scanning
Banner Grabbing
Fingerprinting & Banner Grabbing
Checking for Open Ports Lab Part 2
Check for Live Systems & Ports
Scanning with XMAS Scan Part 2
Scanning
Course Description
Attackers use scanning and enumeration to determine what live systems are on the network (host discovery) and additional information about those systems, like the operating system in use and software version. With vulnerability scanning, an attacker attempts to locate specific weaknesses in system software. Specifically, the attacker is hoping to find known vulnerabilities (CVE) that they can easily exploit. This course is designed to be predominantly hands-on and covers the theory of scanning, enumeration, and vulnerabilities at a high-level.