Главная
Study mode:
on
1
Overview
2
Information Gathering Phase
3
Passive Information Gathering
4
DNS Records
5
NSLOOKUP
6
Open ports
7
Send flag
8
Scan modes
9
Port knocking
10
Access points
11
Fingerprinting
12
Nmap
13
Telnet
14
Netcat
15
Network Mapping
16
Summary
Description:
Explore the fundamentals of footprinting and scanning in this comprehensive 29-minute video lecture from the Certified Ethical Hacker (CEH) Unit 3 course. Delve into crucial topics such as information gathering phases, passive information gathering techniques, DNS records, and NSLOOKUP. Learn about open ports, scan modes, port knocking, and access points. Gain insights into fingerprinting methods, and master essential tools like Nmap, Telnet, and Netcat. Conclude with an overview of network mapping techniques. This educational content, presented by Bill Buchanan OBE, provides a solid foundation for aspiring ethical hackers and cybersecurity professionals.

CeH Unit 3: Footprinting and Scanning - Information Gathering and Network Mapping

Bill Buchanan OBE
Add to list
00:00
-00:33