From the course: CompTIA PenTest+ (PT0-002) Cert Prep
Unlock this course with a free trial
Join today to access over 23,400 courses taught by industry experts.
Analyzing scan output
From the course: CompTIA PenTest+ (PT0-002) Cert Prep
Analyzing scan output
- Remember that the purpose of collecting all this reconnaissance information is not to simply have a lot of information to slap onto the end of a report. The idea is to analyze the output that you receive from these tools, determine what they're telling you and pull out the most important pieces of information. So it's important that before you run a tool or when you run a tool, that you understand what the output's going to look like. DNS lookups are going to give you lots of information. You've already used Nslookup and Whois. Go look at the output that you received and ask yourself, what is this telling me? What information am I looking for? And what information is this filling in? You could also crawl websites to get lots of information, but understand what you get back. You can find tons and tons of pages and pages of information, but if you don't understand how to analyze it, you're not going to be getting much information and you're going to be wasting your time. Netcat can…
Contents
-
-
-
-
Scanning and enumeration4m 16s
-
(Locked)
Scanning and demo10m 46s
-
(Locked)
Packet investigation7m 57s
-
(Locked)
Packet inspection demo5m 48s
-
(Locked)
Labtainers setup12m 9s
-
(Locked)
Labtainers lab: Wireshark8m 54s
-
(Locked)
Application and open-source resources11m 38s
-
(Locked)
Passive reconnaissance10m 7s
-
(Locked)
Active reconnaissance7m 50s
-
(Locked)
Vulnerability scanning8m 41s
-
(Locked)
Vulnerability scanning demo16m 20s
-
(Locked)
Labtainers lab: Network basics2m 50s
-
(Locked)
Labtainers lab: Nmap discovery3m 12s
-
(Locked)
Target considerations15m 36s
-
(Locked)
Analyzing scan output5m 1s
-
(Locked)
Nmap scoping and output options21m 4s
-
(Locked)
Nmap timing and performance options6m 31s
-
(Locked)
Prioritization of vulnerabilities9m 7s
-
(Locked)
Common attack techniques12m 5s
-
(Locked)
Automating vulnerability scans3m 35s
-
(Locked)
Credential attacks14m 31s
-
(Locked)
Labtainers lab: Password cracking2m 23s
-
(Locked)
Labtainers lab: Secure Sockets Layer2m 30s
-
(Locked)
Labtainers lab: Routing basics1m 37s
-
-
-
-
-
-
-
-
-
-
-