From the course: Offensive Penetration Testing
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Scanning with Nmap
From the course: Offensive Penetration Testing
Scanning with Nmap
Scanning with Nmap. In this lesson, we'll understand how to use Nmap to scan for open ports and services. So Nmap is my go-to. It's been around a long time. I've used it for many years. I think it's been around for like 23 years. It's been -- and they keep working on this project. They keep improving it. I think they have like interns or people volunteer every summer to improve the Nmap scripting engine. So I think it's a fast scanner. Of course, Masscan is even faster, but Nmap is very versatile. It scans for TCP, UDP and like I said, it's great for banner grabbing and enumeration and I can't say enough good things about it. It's so good that I've memorized all the flags. And you may have your go-to flags when you use Nmap, but I certainly have mine. If you want to scan a single host, you just do Nmap and the host's IP address. Or you could do google.com. Although don't use google.com, use something you're authorized to scan. I would say that using that -v or I use three V's for…
Contents
-
-
-
-
-
Scanning network protocols4m 53s
-
(Locked)
Scanning with Nmap8m 1s
-
(Locked)
Scanning with MASSCAN6m 53s
-
(Locked)
Scanning with Netcat9m 53s
-
(Locked)
Using Wireshark5m 25s
-
(Locked)
Wireshark and Encrypted Traffic4m 57s
-
(Locked)
Weaponizing Wireshark6m
-
(Locked)
SMB enumeration6m 33s
-
(Locked)
SMB enumeration demo11m 19s
-
(Locked)
NFS enumeration7m
-
(Locked)
SMTP enumeration5m 17s
-
(Locked)
SNMP enumeration5m 42s
-
(Locked)
FTP enumeration3m 53s
-
(Locked)
FTP enumeration demo6m 36s
-
(Locked)
SSH enumeration12m 25s
-
(Locked)
Protocol tips6m 50s
-
(Locked)
Network Protocols Lab1m 17s
-
-
-
-
-
-
-
-
-