17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
The third phase attackers perform on a target is enumerating accounts and services. This course will teach you skills attackers use for enumeration that needed for the Certified Ethical Hacking exam.
Description
To truly compromise a system, making sure you know what OS, accounts, and services that are running is key. In this course, Ethical Hacking: Enumeration, you’ll learn to identify accounts and services through enumeration. First, you’ll explore how to use NetBIOS to expose intel. Next, you’ll discover how to use LDAP to expose user accounts and other protocols to complete your enumeration tasks. Finally, you’ll learn the countermeasures to thwart enumeration attacks. When you’re finished with this course, you’ll have the skills and knowledge of enumeration techniques needed for the Certified Ethical Hacking exam.
Level
• Intermediate
About Author
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.
SIMILAR
TORRENT
UPLOADEDSIZESEEDS LEECHS
Pluralsight | Cisco Enterprise Networks: Troubleshooting BGP and GRE Tunnels [FCO]by Prom3th3uS
9 months 280.31 MB15 2
Python for Data Analysis, 2nd Edition By Wes McKinney (2017) [AhLaN]by abidmail
1 year 8.98 MB14 2
O’REILLY | Go for Python Developers [FCO]by Prom3th3uS
7 months 392.94 MB17 1
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
0. Websites you may like/How you can help our Group!.txt
204 B
01. Course Overview/01. Course Overview.mp4
4.2 MB
02. Discussing Enumeration and the Techniques Used/02. Discussing Enumeration.mp4
9.5 MB
02. Discussing Enumeration and the Techniques Used/03. The Techniques of Enumeration.mp4
10.9 MB
02. Discussing Enumeration and the Techniques Used/04. Know Your Ports and Services.mp4
6.4 MB
03. Defaults and NetBIOS/05. Enumerating via Defaults and NetBIOS.mp4
14.3 MB
03. Defaults and NetBIOS/06. What Is NetBIOS - A Review.mp4
2.7 MB
03. Defaults and NetBIOS/07. Demo-Using Built-in Commands.mp4
12.2 MB
03. Defaults and NetBIOS/08. Demo-Using nmap.mp4
7.7 MB
03. Defaults and NetBIOS/09. Demo-Pulling SIDs and User Accounts.mp4
11.1 MB
03. Defaults and NetBIOS/10. Microsoft Tools for Enumeration...Wait What.mp4
6.7 MB
03. Defaults and NetBIOS/11. NetBIOS Enumeration and SuperScan.mp4