Hacking with Nmap in Kali Linux

Understanding how the nmap tool can be used in a Penetration Test

Ratings: 4.47 / 5.00




Description

I'm sure you have heard of nmap before. It has been around since the 90's and featured in many movies and TV series involving technology.

In this course, I will quickly show you in great detail how to use nmap to scan and enumerate a target. Including, but not limited to; 

Scanning hosts to find alive hosts

Scanning open ports, and understanding closed ports, with firewalls. 

Enumerating services and software versions accurately

Enumerating a targets Operating System to better gauge the next phase of attack

Putting it all together, generating a nice report that we then convert to an html file. 

What You Will Learn!

  • Proficiently use nmap to conduct scanning of remote targets.

Who Should Attend!

  • Students seeking help using nmap to conduct penetration tests