Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

Ethical Hacking: Enumeration

via Pluralsight

Overview

Prepare for a new career with $100 off Coursera Plus
Gear up for jobs in high-demand fields: data analytics, digital marketing, and more.
Pluralsight is not an official partner or accredited training center of EC-Council. Now that we've found out "live" systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data.

Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Topics:
  • Enumeration Explained & the Techniques Used
  • Enumerating via Defaults & NetBIOS
  • Enumerating via SNMP
  • Enumerating via LDAP
  • Enumerating via NTP
  • Enumerating via SMTP
  • Enumerating via DNS
  • Oh, There's More
  • Countermeasures for Enumeration

Taught by

Dale Meredith

Reviews

4.5 rating at Pluralsight based on 184 ratings

Start your review of Ethical Hacking: Enumeration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.