O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Scanning and Enumeration with Kali Linux

Video Description

Extract information from a target using various scanning tools

About This Video

  • A comprehensive guide that illustrates how to gain information about a target from various sources such as directory enumeration, service discovery, and technology mapping.
  • Run remote applications and explore the network around a compromised host
  • Revisit some of the previous tools along with using new techniques to learn about the target environment

In Detail

Kali Linux contains a large amount of penetration testing tools from various different niches of the security and forensics fields. The Kali Linux penetration testing platform contains a vast array of tools and utilities, from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems.

This course will explore the different types of applications and commands to be run on a remote system based on types of goals that an attacker wishes to accomplish. It will cover how to extract useful information from a target that has been located. This course will teach the viewers I details about enum4linux with which one will be able to extract useful information. One will be able to explore the amap tool. This tool can be used to to identify services running on non-standard ports. As you go ahead, this course will teach one how to extract useful information from a target that they have located. The viewers will also be taught how to Discover non-contiguous IP blocks using dnsenum and how to scan with Nikto.

This is the logical follow up to information gathering where we take the information we have gathered and then use that to more closely investigate a target