Description
In This course, students will learn how to use three cybersecurity tools namp , sqlmap and nikto. These tools very important and very necessary for ethical hackers. They are open source tools and for free to use. Students will start learn networks basics and learn how to build the required cyber security lab. Then, they will learn some necessary and essential systems commands. After that, will start with nmap. In nmap section, students will learn to do the following
fingerprinting OS services running on target host.
discovering hosts with TCP SYN ping scan
Discovering hosts with UDP SYN ping scan
Os detection in verbose mode.
Discovering hosts with IP, ICMP and ARP ping scan.
Aggressive mode scan os guessing
intense scan
discovering host names by brute-forcing DNS records.
getting information from whois record.
reason scan
scan an entire subnet.
HTTP Enumeration
FTP Enumeration
DNS Enumeration
SSH Enumeration
SMB Enumeration
SMTP Enumeration
MYSQL Enumeration
IP address geolocation
Trace out geolocation.
Then start with sqlmap and they learn and do the following
Access Databases names
Access databases tables
Access databases columns
dump data from data bases columns
Access passwords and passwords hashes from databases.
Access information schema of databases.
In the last part, students will learn Nikto and do the following
Nikto basic scan
scan specific port with Nikto.
scan domain with SSL enabled
scan multiple targets with nikto
output nikto scan result.
Who this course is for
beginners.