» » » Pluralsight - Ethical Hacking: Enumeration

Information of news
5-09-2015, 20:41

Pluralsight - Ethical Hacking: Enumeration

Category: Tutorials / Other

Pluralsight - Ethical Hacking: Enumeration

Pluralsight - Ethical Hacking: Enumeration
Size: 617MB | Duration: 3h 00m | Video: AVC (.mp4) 1024x576 15fps | Audio: AAC 44.1KHz 2ch
Genre: eLearning | Level: Beginner | Language: English

Now that we've found out "live" systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data such as usernames, computer names, network share, and more.
Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network.

Pluralsight - Ethical Hacking: Enumeration

Download link:
Links are Interchangeable - Single Extraction - Premium is support resumable



Site BBcode/HTML Code:
Dear visitor, you went to the site as unregistered user.
We recommend you Sign up or Login to website under your name.
Would you like to leave your comment? Please Login to your account to leave comments. Don't have an account? You can create a free account now.

Tag Cloud

archive of news

free html hit counter