English | Size: 742.54 MB (778,611,143 Bytes) Category: CBTs
This course is part of the 20 course Ethical Hacking Series. So, after reconnaissance, we need to scan for basics, kind of like knocking on all the doors to see who is home and what they look like. Then, when you find a machine that’s “live”, we need to get to know it really well, asking some rather personal questions like, “what OS are you running?” or “what applications are you running?” and “which ports are listening on the network?”. [Read more…]