TOIT Training
(909) 252-7584
[email protected]
Search
Log in
Menu
Home
Library
IT Library
Developer Courses
User Cuorses
Plans & Pricing
Features
About Us
Contact Sales
Roadmap
Home
Courses
Enterprise Linux
Penetration Testing Linux
Curriculum
14 Sections
41 Lessons
3 Hours
Expand all sections
Collapse all sections
01. Discovering hosts via Ping Scan
2
1.1
nmap -sn 10.0.0.0/8
1.2
What difference TTL means
02. TCP Scanning:
2
2.1
unicornscan -i -I -mT $IP:a
2.2
nmap -v -p- -sT
03. UDP Scanning:
2
3.1
unicornscan -i -I -mU $IP:a
3.2
nmap -v -p- -sU
04. Searchsploit (Searches exploitdb)
0
05. Some common ports and what to do:
5
5.1
21 – FTP
5.2
MITM (Requires more setup)
5.3
Brute Forcing
5.4
Check for Anonymous access
5.5
Fingerprint version
06. SSH
2
6.1
Brute Force
6.2
Fingerprint version
07. Telnet
2
7.1
Brute Force
7.2
Fingerprint version
08. SMTP
2
8.1
Enumerate Users
8.2
Fingerprint version
09. DNS
4
9.1
Zone transfer
9.2
DNSRecon
9.3
DNSEnum
9.4
Fingerprint version
10. FINGER
2
10.1
Potential command execution
10.2
User enumeration
11. WEB
5
11.1
Local Remote File Inclusion (LFI & RFI)
11.2
Dirbuster Gobuster
11.3
Nikto
11.4
robots.txt
11.5
Fingerprint version
12. SNMP
9
12.1
SNMP Bruteforce
12.2
snmpwalk
12.3
.1.3.6.1.4.1.77.1.2.3.1.1 Running Services
12.4
.1.3.6.1.4.1.77.1.2.27 Share Information
12.5
.1.3.6.1.4.1.77.1.2.25 Usernames
12.6
.1.3.6.1.4.1.77.1.4.2 Domain Name
12.7
.1.3.6.1.2.1.1.5 Hostnames
12.8
MIBS
12.9
Default Community Strings
13. LDAP
1
13.1
Enumeration
14. SMB
3
14.1
Mounting Shares
14.2
smbclient
14.3
enum4linux
This content is protected, please
login
and
enroll
in the course to view this content!