Ethical Hacking
(Scanning Networks)
Network scanning refers to the use of a computer network to gather information regarding computing systems. Network scanning is mainly used for security assessment, system maintenance, and also for performing attacks by hackers.
Topics Cover In This Course
Introduction:
- Welcome
- What you should know
- Hacking ethically
- Virtual network setup
- Roadmapping a scan
- Scan techniques
- Scanning vs. penetration testing
- Scanning IPv6 networks
- Port scanning countermeasures
- The three-way handshake
- TCP flags
- Idle scans
- Scan and query DNS
- Scan using ICMP
- Map a network with Nmap
- Passive operating system discovery
- SSDP for discovery
- Other network mapping tools
- Vulnerability scanning overview
- Vulnerability discovery with Acunetix
- Commercial and free scanners
- Use hping
- Scan with Nikto
- NetScan tools
- Intrusion detection systems
- Use IP fragmentation scan
- Hiding with onion routing
- Proxifier and SocksChain
- IP addresses spoofing countermeasures
0 Comments