
INE | Ethical Hacking: Module 4 :: Enumeration | Josue Vargas
English | Size: 344.78 MB
Category: CBTs
In the enumeration module you will learn how to use the discovered services and protocols running in your target network to gather more details and difficult to obtain intelligence prior to the actual System Hacking phase. This module is the last of the preliminary investigative phases in the hacking cycle and with it ends the information gathering which will now empower us to narrow down our targets and start planning our attacks against specific technologies and choose the appropriate hacking tools we will learn about in the remainder of this course.
[Read more…]