Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Important Hacking Tools Nmap,Sqlmap And Nikto

    Posted By: ELK1nG
    Important Hacking Tools Nmap,Sqlmap And Nikto

    Important Hacking Tools Nmap,Sqlmap And Nikto
    Last updated 7/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.81 GB | Duration: 4h 54m

    Cybersecurity tools nmap, sqlmap and nikto

    What you'll learn
    Lean how to use namp and sqlmap and nikto tools
    scan networks and systems by using nmap and scan website vulnerabilities
    Scan databases vulnerabilities by using SQLMAP.
    Preform SQL injection with SQLMAP.
    Be able to use most required security tools
    Requirements
    NO Requirements or prerequisites needed.
    Description
    In This course, students will learn how to use three cybersecurity tools namp , sqlmap and nikto. These tools very important and very necessary for ethical hackers. They are open source tools and for free to use. Students will start learn networks basics and learn how to build the required cyber security lab. Then, they will learn some necessary and essential systems commands. After that, will start with nmap. In nmap section, students will learn to do the following:fingerprinting OS services running on target host.discovering hosts with TCP SYN ping scanDiscovering hosts with UDP SYN ping scanOs detection in verbose mode.Discovering hosts with IP, ICMP and ARP ping scan.Aggressive mode scan os guessingintense scandiscovering host names by brute-forcing DNS records.getting information from whois record.reason scanscan an entire subnet.HTTP EnumerationFTP EnumerationDNS EnumerationSSH EnumerationSMB EnumerationSMTP EnumerationMYSQL EnumerationIP address geolocationTrace out geolocation.Then start with sqlmap and they learn and do the following:Access Databases namesAccess databases tablesAccess databases columnsdump data from data bases columnsAccess passwords and passwords hashes from databases.Access information schema of databases.In the last part, students will learn Nikto and do the following:Nikto basic scanscan specific port with Nikto.scan domain with SSL enabledscan multiple targets with niktooutput nikto scan result.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Section 2: Introduction to NMAP ,SQLMAP and Nikto

    Lecture 2 Introduction to NMAP

    Lecture 3 Introduction to SQLMAP

    Lecture 4 Introduction to Nikto

    Section 3: Network Basics

    Lecture 5 Network Basic part1

    Lecture 6 Network Basics Part2

    Lecture 7 Network Basic Part3

    Section 4: Build your lab.

    Lecture 8 Download and Install Vmware

    Lecture 9 Download and Install Virtualbox

    Lecture 10 Download and Install Kali Linux

    Lecture 11 Take a look on Kali Linux

    Lecture 12 Download and Install Windows 10 VM

    Lecture 13 Download and Install metasploitable2

    Lecture 14 Finishing lab settings part1

    Lecture 15 Finishing lab settings part2

    Section 5: System commands Essentials

    Lecture 16 System commands Essentials part1

    Lecture 17 System Commands Essentials part2

    Lecture 18 System Command Essentials part3

    Section 6: NMAP for Ethical Hacker

    Lecture 19 Introduction to NMAP

    Lecture 20 Fingerprinting OS and services running on target host

    Lecture 21 Discovering host with TCP SYN ping scan

    Lecture 22 Discovering hosts with UDP ping scan

    Lecture 23 OS detection in verbose Mode

    Lecture 24 Hosts Discovering with IP , ICMP , ARP ping scan

    Lecture 25 Aggressive Mode and OS guessing scan

    Lecture 26 Intense Scan

    Lecture 27 Discovering hostnames by brute-forcing DNS records

    Lecture 28 Getting information from whois record using nmap

    Lecture 29 Reason Scan

    Lecture 30 Scan using an input file

    Lecture 31 Scan Entire Subnet

    Lecture 32 HTTP Enumeration in nmap

    Lecture 33 FTP Enumeration in nmap

    Lecture 34 DNS Enumeration in nmap

    Lecture 35 SSH Enumeration in nmap

    Lecture 36 SMB Enumeration in nmap

    Lecture 37 SMTP Enumeration in nmap

    Lecture 38 MYSQL Enumeration in nmap

    Lecture 39 Performing IP address geolocation in nmap

    Lecture 40 Traceout geolocation in nmap

    Section 7: SQLMAP for Ethical Hackers

    Lecture 41 Introduction to SQLMAP

    Lecture 42 Introduction to SQL

    Lecture 43 list databases at the target by using SQLMAP

    Lecture 44 Access tables in databases by using SQLMAP

    Lecture 45 Access Columns in databases tables in SQLMAP

    Lecture 46 Dump data from databases columns by using SQLMAP

    Lecture 47 Access Passwords in databases using SQLMAP

    Lecture 48 Access to information Schema of databases using SQLMAP

    Section 8: Nikto for ethical hackers

    Lecture 49 Introduction to Nikto

    Lecture 50 Nikto basic Scan

    Lecture 51 Scan specific port using Nikto

    Lecture 52 Scan Domain With SSL enabled using Nikto

    Lecture 53 Scan multiple targets with Nikto

    Lecture 54 Output Nikto scan result

    beginners.