CEH v12: NetBIOS, SMB, SNMP, and LDAP Enumeration

CEH v12    |    Intermediate
  • 3 videos | 59m 38s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
To be a successful ethical hacker, you need to be good at gathering information. In this course, you'll explore the concept of enumeration, including what it is, how it's done, and the importance of the details gathered during this process. Next, you'll learn how to enumerate a target's useful or sensitive information using both Server Message Block (SMB) and NetBIOS. You'll move on to learn how you can use Simple Network Management Protocol (SNMP) to access information about target systems. Finally, you'll explore the details of the Lightweight Directory Access Protocol (LDAP) protocol and some tools that use LDAP to help you enumerate your targets. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Enumerate a target’s useful or sensitive information using the smb protocol
    enumerate information from a host via netbios
    Recognize the components of the simple network management protocol (snmp)
    recognize the tools available to report on target systems using snmp
  • distinguish the port used by the simple network management protocol (snmp)
    Recognize the details of the lightweight directory access protocol (ldap)
    identify the tools that utilize ldap to help you enumerate your targets

IN THIS COURSE

  • Locked
    1.  NetBIOS and Server Message Block (SMB) Enumeration
    23m 34s
    After completing this video, you will be able to enumerate a target's useful or sensitive information using both Server Message Block (SMB) and NetBIOS. FREE ACCESS
  • Locked
    2.  Simple Network Management Protocol (SNMP) Enumeration
    18m 41s
    In this video, we will explore the wealth of information Simple Network Management Protocol (SNMP) reports about target systems. FREE ACCESS
  • Locked
    3.  Lightweight Directory Access Protocol (LDAP) Enumeration
    17m 23s
    Upon completion of this video, you will be able to outline the details of the Lightweight Directory Access Protocol (LDAP) protocol and identify tools that utilize LDAP to help you enumerate your targets. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)