uploady.io
Movieblogarea
crawli download suchmaschine
DDL Suchmaschine
archivx.to
Rapidgator.net
HomeRdp
WarezOmen
http://creator.themasoftware.com/
WELCOME TO
OUR WAREZHEAVEN.COM!

NMAP and SQLMAP FOR ETHICAL HACKERS

voska89 Ebooks & Tutorials 07 May 2022, 03:44 0
NMAP and SQLMAP FOR ETHICAL HACKERS
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.80 GB | Duration: 54 lectures * 4h 53m
Cybersecurity tools nmap, sqlmap and nikto


What you'll learn
Lean how to use namp and sqlmap and nikto tools
scan networks and systems by using nmap and scan website vulnerabilities
Scan databases vulnerabilities by using SQLMAP.
Preform SQL injection with SQLMAP.
Be able to use most required security tools
Requirements
NO Requirements or prerequisites needed.
Description
In This course, students will learn how to use three cybersecurity tools namp , sqlmap and nikto. These tools very important and very necessary for ethical hackers. They are open source tools and for free to use. Students will start learn networks basics and learn how to build the required cyber security lab. Then, they will learn some necessary and essential systems commands. After that, will start with nmap. In nmap section, students will learn to do the following
fingerprinting OS services running on target host.
discovering hosts with TCP SYN ping scan
Discovering hosts with UDP SYN ping scan
Os detection in verbose mode.
Discovering hosts with IP, ICMP and ARP ping scan.
Aggressive mode scan os guessing
intense scan
discovering host names by brute-forcing DNS records.
getting information from whois record.
reason scan
scan an entire subnet.
HTTP Enumeration
FTP Enumeration
DNS Enumeration
SSH Enumeration
SMB Enumeration
SMTP Enumeration
MYSQL Enumeration
IP address geolocation
Trace out geolocation.
Then start with sqlmap and they learn and do the following
Access Databases names
Access databases tables
Access databases columns
dump data from data bases columns
Access passwords and passwords hashes from databases.
Access information schema of databases.
In the last part, students will learn Nikto and do the following
Nikto basic scan
scan specific port with Nikto.
scan domain with SSL enabled
scan multiple targets with nikto
output nikto scan result.
Who this course is for
beginners.

Homepage
https://www.udemy.com/course/nmap-and-sqlmap-for-ethical-hackers/


Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me


Links are Interchangeable - No Password - Single Extraction

Related News

Comments (0)

Add comment