Torrent details for "Udemy - Getting Started in Port Scanning Using Nmap and Kali Linux"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
907.98 MB
Info Hash:
f6c682a3ece9584cba53b6019a4c4434e30494e2
Added By:
Added:  
22-11-2020 06:29
Views:
888
Health:
Seeds:
1
Leechers:
0
Completed:
137
wide




Description
wide
Image error
Description

How Secure Is Your System?

A default install of CentOS 8 may seem like a good idea but how exposed does that leave you, after all it is Enterprise Level Linux.

In this course we work with nmap and Wireshark on Kali Linux from Offensive Security. Scanning your network with the tools and systems used by hackers helps you understand the cyber security risk to your systems. First, we identify one simple weakness with port 9090 open by default, in the firewall in readiness for Cockpit the web administration console. Cockpit is disabled by default leaving the system with one open port 22 and one closed port 9090 just what is needed for an effective Operating System detection scan. Simply closing 9090 in the firewall reduces this threat.

Next we learn to audit SSH security to detect systems that allow password based authentication, again a default setting we need to secure. The nmap Scripting Engine or NSE is perfect to delve inside of the services running on your system to expose weaknesses. Throughout the course, we use Wireshark to analyse the network activity helping you to understand the different modes of nmap.

Finally we secure the threats using Ansible configuration management; ensuring that the fixes are documented and repeatable.

The main topics covered in this course include:

   Nmap as root and non-root accounts
   The detection phases used by nmap
   Host discovery using nmap
   Creating lists of online hosts
   Using different host discovery techniques in nmap
   Using different port selection mechanisms in nmap
   Using nmap and awk to list SSH Servers on the network
   Capturing and filtering packets with Wireshark
   Using NSE scripts to print SSH Host-keys and authentication methods
   Using Ansible to secure your host configuration

Who this course is for:

   Linux administrators looking to secure their systems
   Security practitioners needing to learn more about network analysis

Requirements

   You should have a good understanding of Linux from the command line
   You should have some knowledge on networking

Last Updated 5/2020

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes