CEH v12: NTP, NFS, SMTP, and FTP Enumeration

CEH v12    |    Intermediate
  • 3 videos | 54m 41s
  • Includes Assessment
  • Earns a Badge
Having the correct time helps to ensure systems operate properly, especially if you have configured things like time-based access. In this course, you'll explore the Network Time Protocol (NTP), including attributes and enumeration tools. You'll also examine the Network File System (NFS) and how it can be taken advantage of when implemented incorrectly. Finally, you'll learn about the Simple Mail Transfer Protocol (SMTP) and File Transfer Protocol (FTP), including what details can be enumerated from target systems using both of these protocols. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the purpose of the network time protocol (ntp)
    describe the tools that can be used to enumerate ntp
    Outline the network file system (nfs) and recognize how to take advantage of it when implemented incorrectly
    recognize how to detect nfs file systems on remote systems
    mount nfs mount points from a remote system on a local system
  • describe the network file system (nfs)
    Recognize how to verify user accounts on target systems running simple mail transfer protocol (smtp)
    recognize tools that can be used to enumerate details from target systems running smtp
    recognize how to access or find smtp and ftp services on a target system

IN THIS COURSE

  • Locked
    1.  Network Time Protocol (NTP) Enumeration
    14m 27s
    Upon completion of this video, you will be able to outline the purpose of Network Time Protocol (NTP), its attributes, and tools you can use for enumeration. FREE ACCESS
  • Locked
    2.  Network File System (NFS) Enumeration
    20m 6s
    After completing this video, you will be able to outline the Network File System (NFS) and recognize how to take advantage of it when implemented incorrectly. FREE ACCESS
  • Locked
    3.  SMTP and FTP Enumeration
    20m 8s
    Upon completion of this video, you will be able to recognize what details can be enumerated from target systems using Simple Mail Transfer Protocol (SMTP) and File Transfer Protocol (FTP). FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 26 users Rating 4.8 of 26 users (26)
Rating 4.8 of 21 users Rating 4.8 of 21 users (21)