Module 5: Scanning
Learning Outcomes:
- Discuss the different tools and steps when preparing for the scanning phase.
- Scoping
- Permission Memo
- Non-Disclosure
- Rules of Engagement
- Discuss and demonstrate different scanning tools.
- NMAP/Zenmap
- HPING
- Tenable
- Qualys
- Nikto
- SSLTest
Reference Materials:
Supplementary Articles:
- A Quick Guide To Network Scanning for Ethical Hacking
- Ethical Hacking: Scanning Networks
- Ethical Hacking: Scanning Networks
- Nmap Tutorial For Beginners | How to Scan Your Network Using Nmap | Ethical Hacking Tool | Edureka
- Ethical Hacking – Scanning Individual Hosts, Devices and Subnets
- Ethical Hacking (CEHv10): Scanning with Advanced IP Scanner (see the magic)
Video Lessons:
- INTRODUCTION TO NETWORK SCANNING IN ETHICAL HACKING EASY WAY
- Network Scanning | Scanning in Ethical Hacking | CEH Course | Craw Security
- Ethical Hacking Online Course Module 3 (SCANNING , TCP, ICMP /UDP, NMAP , NESSUS , MITIGATION )
Case Assignments:
Assessment:
- Recitation
- Case Analysis