Welcome to Ethical Hacking / Network Security Pentesting & Nmap. From the Basics to Advanced Exploitation.
This course starts with basics with TCP/IP Model and OSI Model and how it can be used in our day to day life. We will also learn TCP, UDP Packets, and Topologies to make our base stronger and then further move on to Ports and Protocols usage with practicals.
This course covers All the Nmap Scan Types with Wireshark Packet Analysis for a better understanding of what’s happening behind the hood.
The course also includes principles for each scan type and its Advantages and Disadvantages for Network Scans.
With this course, we will learn Target Selection Techniques for Host, Subnet Scans & Host Discovery. How to choose large Hosts from files and choose random hosts, also how to exclude them from our scans.
This course will cover port scanning and port knocking which is useful for Penetration Testing & CTF’s.
Then we will see How to perform Service Version Detection for vulnerable services for exploitation. We perform OS Detection and fuzzy scripts to identify the underlying targeted OS. We will also cover Nmap Output Formats to save the output in different formats like HTML and XML. We Willa also see How we can convert XML to CSV format for Recon of Bug Bounty & Penetration Testing.
We will cover Script Scans and use Nmap’s powerful scripting engine for scanning. Next, we will cover the Nmap Script attack for different categories like Safe, Vulnerability, DOS, Exploit, Not Intrusive, and Boolean Expressions. Next, we will cover Nmap for reconnaissance for Bug Bounty and Pentesting.
We will cover Nmap Protocols and Exploitation in which we will see protocols like FTP, SSH, HTTP and its exploitation. We will also cover HTTP Basic Auth Exploitation and PUT to RCE using Nmap. Next section, we will see Custom NSE scripts and its anatomy and will also learn How to write your own scripts. In the next section, we will cover Nmap Timing Parameters and Firewall Analysis to bypass firewalls with Nmap parameters. Next, we will cover Nmap Timing and Performance to tune Nmap Scans for better results and performance.
Next, we will learn how to bypass Timing based firewalls with Nmap Next section, we will learn How to Bypass IDS and Firewalls with Mac Spoofing, Cloak scan with decoys, Faking TTL and adding Bogus TCP/UDP Checksums. Next, we will see The Nmap GUI which is the Zenmap
In the last section, we will write our own Python program for scanning and OS Detection based on Nmap.