Time
1 hour 34 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Description

In this next video in the series of why sites get hacked, we take a deeper look into enumeration. After the network terrain has been mapped out, we need to begin probing for vulnerabilities. This is accomplished in two ways: manually and automatically via scanning. We discuss various manual methods along with several automated tools such as Nessus, Armitage, and Searchploit.

Up Next

Web App Security Fundamentals

What is a web app? A web app is a client?server software application in which the client (or user interface) runs in a web browser. Common web applications include webmail, ...

Instructed By

Instructor Profile Image
CyDefe
Instructor