Important Hacking Tools Nmap,Sqlmap And Nikto

Posted By: ELK1nG

Important Hacking Tools Nmap,Sqlmap And Nikto
Last updated 7/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.81 GB | Duration: 4h 54m

Cybersecurity tools nmap, sqlmap and nikto

What you'll learn
Lean how to use namp and sqlmap and nikto tools
scan networks and systems by using nmap and scan website vulnerabilities
Scan databases vulnerabilities by using SQLMAP.
Preform SQL injection with SQLMAP.
Be able to use most required security tools
Requirements
NO Requirements or prerequisites needed.
Description
In This course, students will learn how to use three cybersecurity tools namp , sqlmap and nikto. These tools very important and very necessary for ethical hackers. They are open source tools and for free to use. Students will start learn networks basics and learn how to build the required cyber security lab. Then, they will learn some necessary and essential systems commands. After that, will start with nmap. In nmap section, students will learn to do the following:fingerprinting OS services running on target host.discovering hosts with TCP SYN ping scanDiscovering hosts with UDP SYN ping scanOs detection in verbose mode.Discovering hosts with IP, ICMP and ARP ping scan.Aggressive mode scan os guessingintense scandiscovering host names by brute-forcing DNS records.getting information from whois record.reason scanscan an entire subnet.HTTP EnumerationFTP EnumerationDNS EnumerationSSH EnumerationSMB EnumerationSMTP EnumerationMYSQL EnumerationIP address geolocationTrace out geolocation.Then start with sqlmap and they learn and do the following:Access Databases namesAccess databases tablesAccess databases columnsdump data from data bases columnsAccess passwords and passwords hashes from databases.Access information schema of databases.In the last part, students will learn Nikto and do the following:Nikto basic scanscan specific port with Nikto.scan domain with SSL enabledscan multiple targets with niktooutput nikto scan result.

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Introduction to NMAP ,SQLMAP and Nikto

Lecture 2 Introduction to NMAP

Lecture 3 Introduction to SQLMAP

Lecture 4 Introduction to Nikto

Section 3: Network Basics

Lecture 5 Network Basic part1

Lecture 6 Network Basics Part2

Lecture 7 Network Basic Part3

Section 4: Build your lab.

Lecture 8 Download and Install Vmware

Lecture 9 Download and Install Virtualbox

Lecture 10 Download and Install Kali Linux

Lecture 11 Take a look on Kali Linux

Lecture 12 Download and Install Windows 10 VM

Lecture 13 Download and Install metasploitable2

Lecture 14 Finishing lab settings part1

Lecture 15 Finishing lab settings part2

Section 5: System commands Essentials

Lecture 16 System commands Essentials part1

Lecture 17 System Commands Essentials part2

Lecture 18 System Command Essentials part3

Section 6: NMAP for Ethical Hacker

Lecture 19 Introduction to NMAP

Lecture 20 Fingerprinting OS and services running on target host

Lecture 21 Discovering host with TCP SYN ping scan

Lecture 22 Discovering hosts with UDP ping scan

Lecture 23 OS detection in verbose Mode

Lecture 24 Hosts Discovering with IP , ICMP , ARP ping scan

Lecture 25 Aggressive Mode and OS guessing scan

Lecture 26 Intense Scan

Lecture 27 Discovering hostnames by brute-forcing DNS records

Lecture 28 Getting information from whois record using nmap

Lecture 29 Reason Scan

Lecture 30 Scan using an input file

Lecture 31 Scan Entire Subnet

Lecture 32 HTTP Enumeration in nmap

Lecture 33 FTP Enumeration in nmap

Lecture 34 DNS Enumeration in nmap

Lecture 35 SSH Enumeration in nmap

Lecture 36 SMB Enumeration in nmap

Lecture 37 SMTP Enumeration in nmap

Lecture 38 MYSQL Enumeration in nmap

Lecture 39 Performing IP address geolocation in nmap

Lecture 40 Traceout geolocation in nmap

Section 7: SQLMAP for Ethical Hackers

Lecture 41 Introduction to SQLMAP

Lecture 42 Introduction to SQL

Lecture 43 list databases at the target by using SQLMAP

Lecture 44 Access tables in databases by using SQLMAP

Lecture 45 Access Columns in databases tables in SQLMAP

Lecture 46 Dump data from databases columns by using SQLMAP

Lecture 47 Access Passwords in databases using SQLMAP

Lecture 48 Access to information Schema of databases using SQLMAP

Section 8: Nikto for ethical hackers

Lecture 49 Introduction to Nikto

Lecture 50 Nikto basic Scan

Lecture 51 Scan specific port using Nikto

Lecture 52 Scan Domain With SSL enabled using Nikto

Lecture 53 Scan multiple targets with Nikto

Lecture 54 Output Nikto scan result

beginners.