Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Getting Started With Nmap - The Ultimate Hands-On Course

    Posted By: ELK1nG
    Getting Started With Nmap - The Ultimate Hands-On Course

    Getting Started With Nmap - The Ultimate Hands-On Course
    Published 2/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 3.46 GB | Duration: 3h 28m

    Go from "Scanning Zero" to "Scanning Hero" with this interactive Nmap course. Skills for Ethical Hacking or Blue Teaming

    What you'll learn

    Learn to scan networks for active devices and how to analyze scan activity with Wireshark

    Enumerate endpoints for open ports and services

    Master Host and Server Enumeration, Learning to Identify Service Versions, Operating System, and Common Vulnerabilities

    Learn how the Nmap Scripting Engine works and how to automate scan activity

    Hack common services such as HTTP, FTP and SMB with Nmap

    Requirements

    No hacking experience needed. Fundamental experience with TCP/IP recommended.

    Description

    Welcome to this Nmap Ultimate Hands-On Course!Nmap is a swiss army knife. You cannot go far as a hacker without it. It belongs in the toolbox of every Cybersecurity professional, network engineer, penetration tester, ethical hacker, or SOC analyst. The problem is that there are so many OPTIONS and SWITCHES to remember! What do they do? When do I use them? How can I remember them? If you have ever felt that way when getting started with Nmap, this is the course for you. In this class there are a grand total of two powerpoint slides. Why? Because slides are boring. Instead, we will walk through several hands-on labs that will help you build your Nmap skills as you run each scan along with me. But there is more. With each scan, we are going to capture it with Wireshark and learn how it really works. Instead of just waiting for an output and hoping to understand what to do with it, we will be looking at the scan and responses from a target at the packet level. This will help us know and remember what we are putting out on the wire and what to do with the results we receive from the test. My name is Chris Greer and I am a Wireshark University instructor, as well as a packet analysis consultant for companies all over the globe. Like you, I started out with a deep interest in cybersecurity and ethical hacking. Looking at Nmap scans in Wireshark helped me to understand them, remember them, and utilize them to find vulnerabilities in networks and servers. Ready to SCAN? Let's get to it!

    Overview

    Section 1: Introduction to Nmap

    Lecture 1 Introduction

    Lecture 2 What is Nmap?

    Lecture 3 Who Should Use Nmap?

    Lecture 4 Lab Setup for this Course

    Lecture 5 Capturing Nmap Scans with Wireshark

    Lecture 6 Lab - Installing Nmap and Wireshark

    Lecture 7 Lab - Your First Nmap Scan!

    Lecture 8 Caution! Legal Considerations

    Section 2: Getting help

    Lecture 9 Answering your questions

    Lecture 10 Udemy tips and tricks

    Section 3: Core Nmap Skills - Basic Scans, Top 5 Commands

    Lecture 11 Nmap Help to the Rescue!

    Lecture 12 How to Scan a Host, Subnet, or IP Range

    Lecture 13 Identifying Open Ports an Services on a Host

    Lecture 14 The Top Five Nmap Commands

    Lecture 15 Configuring Wireshark for Analyzing Nmap

    Lecture 16 Lab - Ping and Top Ports Scans

    Lecture 17 Lab - OS Fingerprinting and Aggressive Scanning

    Lecture 18 Analyzing The Phases of an Nmap Scan

    Section 4: Network and Host Discovery Techniques

    Lecture 19 Mapping a Network with Nmap

    Lecture 20 The "Ping" Scan - Local Network Discovery

    Lecture 21 Is it Really a "Ping"

    Lecture 22 Deep Dive into the Default Scan

    Section 5: Interpreting Nmap Scan Results

    Lecture 23 What is a TCP/UDP Port?

    Lecture 24 The Six Port States

    Lecture 25 The Stealth Scan

    Lecture 26 The TCP Connect Scan

    Lecture 27 Which Ports Should We Scan?

    Lecture 28 TCP Null, Xmas, FIN, and Ack Scans

    Lecture 29 When to Use UDP Scans

    Section 6: Beyond the Basics - Version and OS Fingerprinting

    Lecture 30 OS Fingerprinting is Key to Exploiting a System

    Lecture 31 How OS Fingerprinting Works (And When it Won't)

    Lecture 32 What is Version Discovery?

    Lecture 33 Using Verbosity in Nmap Output

    Lecture 34 Exporting Nmap Results to a File

    Section 7: Scan Timing and Performance

    Lecture 35 Making Scans Faster

    Lecture 36 Using Timing Templates

    Lecture 37 Best Practices for Optimal Scan Performance

    Section 8: Nmap Scripting Engine for Automating Scans

    Lecture 38 What is the NSE?

    Lecture 39 The Script Database

    Lecture 40 Lab - NSE: The Default Scripts

    Lecture 41 Lab - NSE: Banners and HTTP Scripts

    Lecture 42 NSE: Practice, Practice, Practice

    Section 9: NSE: Beyond the Basics

    Lecture 43 Lab Setup - Metasploitable

    Lecture 44 Lab - HTTP Enumeration - Finding Hidden Folders

    Lecture 45 Lab - Hacking FTP Logins

    Lecture 46 Lab - SMB Login Enumeration

    Lecture 47 Lab - NSE Vulnerability Scripts

    Lecture 48 Lab - Scanning for TLS Certificates and Versions

    Section 10: Firewall/IDS Evasion and IP Spoofing

    Lecture 49 Why Do This? Be careful!

    Lecture 50 IP Fragmentation

    Lecture 51 Spoofing IP Addresses

    Lecture 52 Using Decoys to Evade Detection

    Lecture 53 Try to Avoid IDS Systems Altogether!

    Section 11: Nmap - Putting It All Together

    Lecture 54 Putting It All Together

    Lecture 55 Tips and Tricks - Nmap Cheat Sheet

    Lecture 56 Common Pitfalls to Avoid

    Lecture 57 Keep Practicing! TryHackMe and More

    Lecture 58 Course Conclusion

    Beginner Ethical Hackers, Penetration Testers, SOC Analysts, Threat Hunters, and Network Engineers will all learn a foundational skill and critical tool for their toolbox!