CEH v11: Nmap IP Scans

Ethical Hacker v11    |    Intermediate
  • 4 videos | 53m 7s
  • Includes Assessment
  • Earns a Badge
Staying off of the radar of your target's security team is a common goal for many ethical hackers when performing security assessments. In this course, you'll learn to use the Nmap IDLE/IPID scan to take advantage of other network hosts to obfuscate scan origins from detection systems and logs. You'll explore using Nmap to discover what is utilizing UDP to help you add to your list of possible inroads of a target system. You'll also examine how SCTP works and how to work with Nmap to use it for scanning purposes. Finally, you'll learn about using Nmap's IPv6 option as another way to discover open ports and about using the versioning option to learn more about the service running on open ports. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • recognize techniques used to avoid detection when performing a scan
    identify the IP fields being used during a zombie scan
    recognize the syntax to perform an idle scan with nmap
    identify the nmap command to perform a UDP scan
    recognize how a system responds to a UDP scan
  • recognize the nmap command to perform an INIT SCTP scan
    identify the number of steps to the SCTP handshake
    recognize how to enable IPv6 scanning in nmap
    identify the nmap command to determine the version of software running on a port

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.