Video Description

The next step in planning an attack is to enumerate the various ports, IP addresses, OSes, services, and software versions running within a target's environment. This is performed in order to uncover potential vulnerabilities which can then be exploited. Tools used in this step include NMAP, Armitage, and ZenMap.

Course Modules

Instructed By

Instructor Profile Image
CyDefe
Instructor