Mooncash
Active member

Important Hacking Tools Nmap,Sqlmap And Nikto
Last updated 7/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.81 GB | Duration: 4h 54m
Cybersecurity tools nmap, sqlmap and nikto
What you'll learn
Lean how to use namp and sqlmap and nikto tools
scan networks and systems by using nmap and scan website vulnerabilities
Scan databases vulnerabilities by using SQLMAP.
Preform SQL injection with SQLMAP.
Be able to use most required security tools
Requirements
NO Requirements or prerequisites needed.
Description
In This course, students will learn how to use three cybersecurity tools namp , sqlmap and nikto. These tools very important and very necessary for ethical hackers. They are open source tools and for free to use. Students will start learn networks basics and learn how to build the required cyber security lab. Then, they will learn some necessary and essential systems commands. After that, will start with nmap. In nmap section, students will learn to do the following:fingerprinting OS services running on target host.discovering hosts with TCP SYN ping scanDiscovering hosts with UDP SYN ping scanOs detection in verbose mode.Discovering hosts with IP, ICMP and ARP ping scan.Aggressive mode scan os guessingintense scandiscovering host names by brute-forcing DNS records.getting information from whois record.reason scanscan an entire subnet.HTTP EnumerationFTP EnumerationDNS EnumerationSSH EnumerationSMB EnumerationSMTP EnumerationMYSQL EnumerationIP address geolocationTrace out geolocation.Then start with sqlmap and they learn and do the following:Access Databases namesAccess databases tablesAccess databases columnsdump data from data bases columnsAccess passwords and passwords hashes from databases.Access information schema of databases.In the last part, students will learn Nikto and do the following:Nikto basic scanscan specific port with Nikto.scan domain with SSL enabledscan multiple targets with niktooutput nikto scan result.
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Introduction to NMAP ,SQLMAP and Nikto
Lecture 2 Introduction to NMAP
Lecture 3 Introduction to SQLMAP
Lecture 4 Introduction to Nikto
Section 3: Network Basics
Lecture 5 Network Basic part1
Lecture 6 Network Basics Part2
Lecture 7 Network Basic Part3
Section 4: Build your lab.
Lecture 8 Download and Install Vmware
Lecture 9 Download and Install Virtualbox
Lecture 10 Download and Install Kali Linux
Lecture 11 Take a look on Kali Linux
Lecture 12 Download and Install Windows 10 VM
Lecture 13 Download and Install metasploitable2
Lecture 14 Finishing lab settings part1
Lecture 15 Finishing lab settings part2
Section 5: System commands Essentials
Lecture 16 System commands Essentials part1
Lecture 17 System Commands Essentials part2
Lecture 18 System Command Essentials part3
Section 6: NMAP for Ethical Hacker
Lecture 19 Introduction to NMAP
Lecture 20 Fingerprinting OS and services running on target host
Lecture 21 Discovering host with TCP SYN ping scan
Lecture 22 Discovering hosts with UDP ping scan
Lecture 23 OS detection in verbose Mode
Lecture 24 Hosts Discovering with IP , ICMP , ARP ping scan
Lecture 25 Aggressive Mode and OS guessing scan
Lecture 26 Intense Scan
Lecture 27 Discovering hostnames by brute-forcing DNS records
Lecture 28 Getting information from whois record using nmap
Lecture 29 Reason Scan
Lecture 30 Scan using an input file
Lecture 31 Scan Entire Subnet
Lecture 32 HTTP Enumeration in nmap
Lecture 33 FTP Enumeration in nmap
Lecture 34 DNS Enumeration in nmap
Lecture 35 SSH Enumeration in nmap
Lecture 36 SMB Enumeration in nmap
Lecture 37 SMTP Enumeration in nmap
Lecture 38 MYSQL Enumeration in nmap
Lecture 39 Performing IP address geolocation in nmap
Lecture 40 Traceout geolocation in nmap
Section 7: SQLMAP for Ethical Hackers
Lecture 41 Introduction to SQLMAP
Lecture 42 Introduction to SQL
Lecture 43 list databases at the target by using SQLMAP
Lecture 44 Access tables in databases by using SQLMAP
Lecture 45 Access Columns in databases tables in SQLMAP
Lecture 46 Dump data from databases columns by using SQLMAP
Lecture 47 Access Passwords in databases using SQLMAP
Lecture 48 Access to information Schema of databases using SQLMAP
Section 8: Nikto for ethical hackers
Lecture 49 Introduction to Nikto
Lecture 50 Nikto basic Scan
Lecture 51 Scan specific port using Nikto
Lecture 52 Scan Domain With SSL enabled using Nikto
Lecture 53 Scan multiple targets with Nikto
Lecture 54 Output Nikto scan result
beginners.
Screenshots
#
Code:
https://rapidgator.net/file/733e06e612e7e40ee20c2a5c8426244f/Important_Hacking_tools_NMAPSQLMAP_and_Nikto.part1.rar.html
https://rapidgator.net/file/f4a3464afac4626bb0fc0690658d76d8/Important_Hacking_tools_NMAPSQLMAP_and_Nikto.part2.rar.html
https://uploadgig.com/file/download/ceda696576e05097/Important_Hacking_tools_NMAPSQLMAP_and_Nikto.part1.rar
https://uploadgig.com/file/download/B6ac542d461f4aa1/Important_Hacking_tools_NMAPSQLMAP_and_Nikto.part2.rar