As a pen tester, the Nmap command will be one of your greatest tools. It is a network mapper with numerous options. Learn how to detect the operating system of a machine, conduct stealthy scans, determine the service and version information, enumerate targets, and output the scan results into several different file formats.
- Now it's time to change focus slightly…and talk about the specific things that we use,…the tools in our toolbox that we use…for penetration testing.…We're moving along to our next objective,…penetration testing tools.…Now, this objective is not the largest objective,…in fact, it's one of the three smaller objectives…on the entire exam.…So you'll be getting questions about specific tools,…however, you won't be getting many in-depth questions,…except perhaps for NMAP,…which we'll talk about in just a moment.…
The important part here is that you understand…which tools to pull out of your toolbox…to apply to a specific situation.…So we're going to be doing a lot of framework…and positioning of these are the tools…you might use for task A.…These are the tools you might use for task B.…It's important that you're aware of…what the tools basically do,…but again, don't worry about digging too far down…into the nuance of how each individual tool is used.…So, let's jump right into the pentester's toolbox.…
The first thing we're going to look at will be,…
Released
11/28/2018This Total Seminars course covers the exam certification topics. For information on additional study resources—including practice tests, lab simulations, books, and discounted exam vouchers—visit totalsem.com/linkedin. LinkedIn Learning members receive special pricing.
This course was created by Total Seminars. We are pleased to offer this training in our library.
We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
Share this video
Embed this video
Video: Nmap scoping and output options