Learn how to enumerate protocols, processes, and services on Windows and Linux machines, and study for the Certified Ethical Hacker exam.
- [Malcolm] When carrying out testing through ethical hacking, one of the key activities that directs the testing is enumeration, the ability to find out everything about a target by enumerating its ports and services, its users and accounts, its processes, and just about everything that can be exposed and enumerated. Carrying out enumeration well is the real key to success in your certifications in your business assignments.
I'm Malcolm Shore, and I've spent a career helping governments and businesses protect their systems against cyber attacks. In this course, I'll explore how to enumerate Windows and Linux systems using the tools built into Kali as well as some third party tools. I'll start by explaining enumeration in the context of technical testing, and I'll demonstrate the basic Windows and Linux tool sets. I'll then look at the detailed enumeration of special protocols, such as SMB, RPC, and SNMP.
I'll show how to enumerate websites and databases, and how to enumerate the internet as a whole. Finally, I'll demonstrate some key third-party tools for enumeration. When you finish this course, you'll have a great understanding of how to make your testing effective by properly enumerating the target. Now let's get started with enumeration.
An overview of the CEH exam, blueprint, and eligibility criteria can be found at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- What is enumeration?
- Understanding NetBIOS, SMB, SAMBA, and RPC
- Profiling hosts
- Investigating interfaces
- Enumerating SMB
- Enumerating SNMP and RPC
- Enumerating the Internet
- Working with other enumeration tools