VJ Security

VJ Security Is An Free Online Learning Website

ETHICAL HACKING - SCANNING NETWORKS

ETHICAL HACKING - SCANNING NETWORKS

Ethical Hacking
(Scanning Networks)

Network scanning refers to the use of a computer network to gather information regarding computing systems. Network scanning is mainly used for security assessment, system maintenance, and also for performing attacks by hackers.

Topics Cover In This Course

Introduction:
  • Welcome
  • What you should know
  • Hacking ethically
  • Virtual network setup
Scanning Overview and Methodology:
  • Roadmapping a scan
  • Scan techniques
  • Scanning vs. penetration testing
  • Scanning IPv6 networks
  • Port scanning countermeasures
Identifying Live Systems Using Protocols:
  • The three-way handshake
  • TCP flags
  • Idle scans
  • Scan and query DNS
  • Scan using ICMP
Blueprint the Network:
  • Map a network with Nmap
  • Passive operating system discovery
  • SSDP for discovery
  • Other network mapping tools
Vulnerability Scanning:
  • Vulnerability scanning overview
  • Vulnerability discovery with Acunetix
  • Commercial and free scanners
Scanning Tools:
  • Use hping
  • Scan with Nikto
  • NetScan tools
Evading Detection:
  • Intrusion detection systems
  • Use IP fragmentation scan
Concealing and Spoofing:
  • Hiding with onion routing
  • Proxifier and SocksChain
  • IP addresses spoofing countermeasures
Tunneling:
  • HTTP
  • SSH
  • Defend against tunneling
Conclusion:
  • Next steps
That Is All

Subscribe Our YouTube Channel And Stay Tuned


Brought To You Free By VJ SECURITY

Click Below To Download The Course


Thank You

Post a Comment

0 Comments