CEH v11: Nmap IP Scans
Ethical Hacker v11 | Intermediate
- 4 Videos | 53m 7s
- Includes Assessment
- Earns a Badge
Staying off of the radar of your target's security team is a common goal for many ethical hackers when performing security assessments. In this course, you'll learn to use the Nmap IDLE/IPID scan to take advantage of other network hosts to obfuscate scan origins from detection systems and logs. You'll explore using Nmap to discover what is utilizing UDP to help you add to your list of possible inroads of a target system. You'll also examine how SCTP works and how to work with Nmap to use it for scanning purposes. Finally, you'll learn about using Nmap's IPv6 option as another way to discover open ports and about using the versioning option to learn more about the service running on open ports. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
identify the IP fields being used during a zombie scanrecognize techniques used to avoid detection when performing a scanrecognize the syntax to perform an idle scan with nmapidentify the nmap command to perform a UDP scanrecognize how a system responds to a UDP scan
identify the number of steps to the SCTP handshakerecognize the nmap command to perform an INIT SCTP scanidentify the nmap command to determine the version of software running on a portrecognize how to enable IPv6 scanning in nmap
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.