Join Malcolm Shore for an in-depth discussion in this video What you should know, part of Ethical Hacking: Enumeration.
- [Voiceover] This is a practical course, and during this course, I'll be using a virtualized computing environment called VirtualBox. I will also be using a number of tools which are part of the Kali Linux framework to test systems. If you're not familiar with virtualization, you should watch the introduction to Kali Linux course, which will show you how to install and use VirtualBox. In addition, I'll be assuming that you understand basic computer and networking concepts, are familiar with Windows, and have a knowledge of basic Linux commands.
This course requires a number of tools to be downloaded and installed, and you can pre-install these tools to avoid unnecessary waiting during the course. The detailed list of tools required to be installed to support this course is available as a pdf in the associated course material.
An overview of the CEH exam, blueprint, and eligibility criteria can be found at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- What is enumeration?
- Understanding NetBIOS, SMB, SAMBA, and RPC
- Profiling hosts
- Investigating interfaces
- Enumerating SMB
- Enumerating SNMP and RPC
- Enumerating the Internet
- Working with other enumeration tools