Introduction to Network Scanning using NMAP | Ping Scan

Introduction to Network Scanning using NMAP | Ping Scan

Sridhar Iyer

54 года назад

73 Просмотров

Introduction to Network Scanning using NMAP | Ping Scan | Ethical Hacking Masterclass

Join this channel to get access to perks:
https://www.youtube.com/channel/UCTaZfA18AN8Fx6hZAm33-DA/join

Video Description:
DISCLAIMER:
Everything shown in the video is strictly for educational purposes and no infringement is intended. Viewers should use their discretion and the content creator or author shall not be held responsible for any proceedings later.


All the Tools can be downloaded from the following links:

(WINDOWS OS)
1. Oracle Virtualbox - https://www.virtualbox.org/
2. Kali Linux VM VirtualBox Image - https://cdimage.kali.org/kali-2024.2/kali-linux-2024.2-virtualbox-amd64.7z
3. Nessus Vulnerability Scanner -https://docs.tenable.com/nessus/Content/InstallNessus.htm
4. Metasploitable Vulnerable VM - https://sourceforge.net/projects/metasploitable/
5. OWASP Vulnerable VM - https://sourceforge.net/projects/owaspbwa/
6. Burpsuite for Windows - https://portswigger.net/burp/releases/professional-community-2024-5-3
7. OWASP ZAP - https://www.zaproxy.org/download/
8. DVWA (Damn Vulnerable Web Application): https://github.com/digininja/DVWA
9. OWASP Juice Shop: https://github.com/bkimminich/juice-shop

(MAC OS)
1. UTM (Virtual machine for MAC) – https://mac.getutm.app (click on download)
2. Kali Linux ISO (MAC ARM Version)
• For Older Macs - https://cdimage.kali.org/kali-2024.2/kali-linux-2024.2-installer-amd64.iso
• For M1/M2/M3 Apple Silicon Devices - https://cdimage.kali.org/kali-2024.2/kali-linux-2024.2-installer-
arm64.iso
3. Installing Nessus in MacOS
https://www.tenable.com/downloads/api/v1/public/pages/nessus/downloads/23402/download?i_agree_to_ten
able_license_agreement=true
(Rest of the steps are same as Windows)
4. Metasploitable Vulnerable VM (Follow the video) - https://youtu.be/siHAj5oc0Ss?si=YwEtBfYoJ-KSftEB
5. OWASP Vulnerable VM – NOT CURRENTLY SUPPORTED ON MACOS
6. Burpsuite in Kali inside UTM(MAC) - https://www.kali.org/tools/burpsuite/
7. OWASP ZAP in Kali inside UTM(MAC) - https://www.kali.org/tools/zaproxy/
8. DVWA in Kali Inside UTM (MAC) - https://www.kali.org/tools/dvwa/

All the products which I have shown and used can be accessed directly using the links below ( Affiliate Links):

1) Tutor Plus Interactive Teaching Device (LITE)- https://amzn.to/3LccsrF
2) Tutor Plus Interactive Panel Device (LIVE) - https://amzn.to/3ig26dw
3) LED TV Stand - https://amzn.to/34QeKgi
4) Tripod - https://amzn.to/36ckDoJ
5) Microphone - https://amzn.to/3fwwZdn

MY AMAZON STORE FRONT

https://www.amazon.in/shop/sridhariyer interactive flat panel sridhar iyer smart board interactive panel price

Тэги:

#sridhar_iyer #Learning #ethical_hacking #ethical_hacking_lab_setup #ethical_hacking_virtual_lab_setup #virtual_lab #VAPT #CEH #Ethical_Hacking #phases_of_ethical_hacking #Cyber_Security #Ethical_Hacking_Bootcamp #ethical_hacker #cyber_security #Vulnerability_Assessment #information_gathering #nmap #nmap_scan #what_is_network_scanning #network_scanning_using_nmap
Ссылки и html тэги не поддерживаются


Комментарии: