Warez.Ge

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

NMAP and SQLMAP FOR ETHICAL HACKERS

loveyou88

Active member
c4e0508c1e9d5411372ab1abb884ef37.jpeg

Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.80 GB | Duration: 54 lectures * 4h 53m
Cybersecurity tools nmap, sqlmap and nikto

What you'll learn
Lean how to use namp and sqlmap and nikto tools
scan networks and systems by using nmap and scan website vulnerabilities
Scan databases vulnerabilities by using SQLMAP.
Preform SQL injection with SQLMAP.
Be able to use most required security tools
Requirements
NO Requirements or prerequisites needed.
Description
In This course, students will learn how to use three cybersecurity tools namp , sqlmap and nikto. These tools very important and very necessary for ethical hackers. They are open source tools and for free to use. Students will start learn networks basics and learn how to build the required cyber security lab. Then, they will learn some necessary and essential systems commands. After that, will start with nmap. In nmap section, students will learn to do the following
fingerprinting OS services running on target host.
discovering hosts with TCP SYN ping scan
Discovering hosts with UDP SYN ping scan
Os detection in verbose mode.
Discovering hosts with IP, ICMP and ARP ping scan.
Aggressive mode scan os guessing
intense scan
discovering host names by brute-forcing DNS records.
getting information from whois record.
reason scan
scan an entire subnet.
HTTP Enumeration
FTP Enumeration
DNS Enumeration
SSH Enumeration
SMB Enumeration
SMTP Enumeration
MYSQL Enumeration
IP address geolocation
Trace out geolocation.
Then start with sqlmap and they learn and do the following
Access Databases names
Access databases tables
Access databases columns
dump data from data bases columns
Access passwords and passwords hashes from databases.
Access information schema of databases.
In the last part, students will learn Nikto and do the following
Nikto basic scan
scan specific port with Nikto.
scan domain with SSL enabled
scan multiple targets with nikto
output nikto scan result.
Who this course is for
beginners.

Homepage
Code:
https://www.udemy.com/course/nmap-and-sqlmap-for-ethical-hackers/

Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
https://hot4share.com/ofbx9mxx2d90/42c85.N.a.S.F.E.H.rar.html
Uploadgig
https://uploadgig.com/file/download/8784fA5ddC0f3141/42c85.N.a.S.F.E.H.rar
Rapidgator
https://rapidgator.net/file/eb5efc8161254d6bf11fe54d3e93b01d/42c85.N.a.S.F.E.H.rar.html
NitroFlare
https://nitro.download/view/282DB78B7DEE403/42c85.N.a.S.F.E.H.rar
Links are Interchangeable - No Password - Single Extraction
 

Users who are viewing this thread

Top