CEH v11: Nmap IP Scans

Ethical Hacker v11    |    Intermediate
  • 4 Videos | 53m 7s
  • Includes Assessment
  • Earns a Badge
Staying off of the radar of your target's security team is a common goal for many ethical hackers when performing security assessments. In this course, you'll learn to use the Nmap IDLE/IPID scan to take advantage of other network hosts to obfuscate scan origins from detection systems and logs. You'll explore using Nmap to discover what is utilizing UDP to help you add to your list of possible inroads of a target system. You'll also examine how SCTP works and how to work with Nmap to use it for scanning purposes. Finally, you'll learn about using Nmap's IPv6 option as another way to discover open ports and about using the versioning option to learn more about the service running on open ports. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • identify the IP fields being used during a zombie scan
    recognize techniques used to avoid detection when performing a scan
    recognize the syntax to perform an idle scan with nmap
    identify the nmap command to perform a UDP scan
    recognize how a system responds to a UDP scan
  • identify the number of steps to the SCTP handshake
    recognize the nmap command to perform an INIT SCTP scan
    identify the nmap command to determine the version of software running on a port
    recognize how to enable IPv6 scanning in nmap

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.