Enumeration Techniques for Penetration Testing
This course is designed to equip cybersecurity professionals and students with practical skills for information gathering and enumeration during penetration testing engagements. Enumeration is a critical step in the hacking lifecycle, enabling ethical hackers to actively collect detailed information about …
This course is designed to equip cybersecurity professionals and students with practical skills for information gathering and enumeration during penetration testing engagements. Enumeration is a critical step in the hacking lifecycle, enabling ethical hackers to actively collect detailed information about systems, networks, and applications. Through hands-on sessions and tool-based demonstrations, learners will master techniques for enumerating common services, extracting sensitive data, and identifying exploitable vulnerabilities.
Introduction to Enumeration
– Enumeration Concepts and Overview
– Purpose and Importance in Cybersecurity
– Difference between Scanning and Enumeration
Enumeration Fundamentals
– What is Enumeration?
– Techniques for Enumeration (Active & Passive)
– Services and Ports Used in Enumeration (DNS, NetBIOS, SMB, SNMP, LDAP, FTP, SSH, etc.)
Windows Service Enumeration
– NetBIOS Enumeration: Concepts, Tools, User Account Enumeration
– Default Passwords in System Enumeration
FTP/TFTP Enumeration
– FTP Enumeration: Banner Grabbing
– TFTP Enumeration
– Metasploit Modules for FTP/TFTP Enumeration
SSH Enumeration
– Version Scanning and Banner Grabbing
– Scripts for SSH Enumeration
– SSH Bruteforce Attacks
MSSQL Server Enumeration
– Information Gathering and SQL User Enumeration
– Brute-forcing Techniques
– Interactive Database Shell Access
VNC/SNMP Enumeration
– VNC Enumeration: Password Cracking, Connection Testing
– SNMP Enumeration: Concepts, Working, MIB, Enumeration Tools
UNIX/Linux Enumeration
– UNIX/Linux Commands for Enumeration
– Linux Enumeration Tools
LDAP/Telnet Enumeration
– LDAP Enumeration Techniques and Tools
– Telnet Enumeration: Script Scanning, Banner Grabbing, Brute-forcing
Web/HTTP Enumeration
– HTTP Method Enumeration
– Checking HTTP Basic Authentication and Service Versioning
MySQL/NTP Enumeration
– MySQL Enumeration: Commands and Brute-forcing
– NTP Enumeration Commands and Techniques
SMTP/DNS Enumeration
– SMTP Enumeration Tools
– DNS Enumeration: Zone Transfer Using NSLookup, Enumeration Tools
SMB/NFS Enumeration
– SMB Enumeration: Null Sessions, Viewing Shares, Enumeration Tools
– NFS Enumeration: Script Scanning, Privilege Escalation, Share Enumeration
Remote Desktop Protocol (RDP) Enumeration
– RDP Enumeration: Nmap Scripts, Brute-force, Adding Users to RDP Group
Practical Sessions & Tools
– Tools Covered: Nmap, Metasploit, SNMPwalk, Enum4linux, netcat, nbtstat, SuperScan, NetScanTools Pro, onesixtyone
– Interactive Challenges and Lab Environment
- 2 Sections
- 34 Lessons
- 15 Weeks
- Password Cracking20
- 1.1Password Cracking1 Hour
- 1.2Password Cracking Techniques1 Hour
- 1.3Creating a Wordlist1 Hour
- 1.4CeWL (Custom Word List Generator Web Crawler)1 Hour
- 1.5Hashcat1 Hour
- 1.6Salted hashes and custom formats1 Hour
- 1.7Document Password Cracking1 Hour
- 1.8Extracting and cracking hashes from 7z, zip and rar1 Hour
- 1.9Extracting and cracking hashes from 7z, zip and rar 21 Hour
- 1.10Linux Password Hashes1 Hour
- 1.11Windows Password Extraction and Cracking1 Hour
- 1.12John the Ripper1 Hour
- 1.13Active Directory Domain ( NTDS.DIT ) Extraction and Cracking1 Hour
- 1.14Hiren’s BootCD PE x641 Hour
- 1.15Windows Logon Bypass Using Utilman.exe1 Hour
- 1.16BitLocker Password Recovery1 Hour
- 1.17Hydra1 Hour
- 1.18Hydra – HTTP POST Form Authentication1 Hour
- 1.19Medusa automates brute-force password1 Hour
- 1.20Patator1 Hour
- Metasploit Framework14
- 2.1Metasploit Framework1 Hour
- 2.2msfconsole usage and commands1 Hour
- 2.3Works with the Metasploit database1 Hour
- 2.4MS08-067 NetAPI Exploitation Workflow1 Hour
- 2.5vsftpd 2.3.4 – Backdoor Command Execution (Metasploitable-2)1 Hour
- 2.6Apache Tomcat Coyote JSP Engine1 Hour
- 2.7Auxiliary1 Hour
- 2.8FTP Enumeration and Scanning with Metasploit Auxiliary1 Hour
- 2.9Metasploit Payloads1 Hour
- 2.10generic shell_reverse_tcp1 Hour
- 2.11Automation of msfconsole via RC Scripts1 Hour
- 2.12Meterpreter (Meta-Interpreter)1 Hour
- 2.13Meterpreter Commands1 Hour
- 2.14Client-Side Attacks1 Hour
You might be intersted in
-
45 Students
-
20 Weeks
-
30 Students
-
3 Hours
-
21 Students
-
10 Weeks
-
80 Students
-
24 Weeks