CEH v12: Nmap IDLE IPID, UDP, and SCTP Scans
CEH v12
| Intermediate
- 3 videos | 50m 11s
- Includes Assessment
- Earns a Badge
Staying off of the radar of your target's security team is a common goal for many ethical hackers when performing security assessments. In this course, you'll learn to use the map IDLE IPID scan to take advantage of other network hosts to obfuscate scan origins from detection systems and logs. You'll explore using nmap to discover what is utilizing UDP to help you add to your list of possible inroads of a target system. You'll also examine how SCTP works and how to work with nmap to use it for scanning purposes. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Recognize techniques used to avoid detection when performing a scanrecognize the syntax to perform an idle scan with nmapidentify the ip fields being used during a zombie scanIdentify the nmap command to perform a udp scan
-
recognize how a system responds to a udp scanIdentify the number of steps to the sctp handshakerecognize the nmap command to perform an init sctp scan
IN THIS COURSE
-
19m 5sIn this video, find out how to utilize the nmap IDLE/IPID scan, aka Zombie scan, to take advantage of other network hosts to obfuscate scan origins from detection systems and logs. FREE ACCESS
-
12m 38sIn this video, you will learn how to use nmap to discover those possibly hidden treasures that are utilizing UDP to help us add to our list of possible inroads of a target system. FREE ACCESS
-
18m 29sUpon completion of this video, you will be able to outline how SCTP works and how nmap can help us utilize SCTP for scanning purposes. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.