Network Fingerprinting and Exploitation

November 11, 2015 by Jatin Jain

network fingerprinting ebookIn this mini-course you will learn some intermediate and advance techniques of network pentesting information gathering, as well as  some new scanning techniques. This is not a basic course; some network pentesting knowledge is required.

We mention and explain many information gathering techniques, including: identifying network targets and how to find Gateway and IP subnet using BEFF;  we also explain ping sweeping using java and post scanning technique with bypassing port banning.

By studying this mini-course, you will become familiar with:

  • Ways of attacking non-http services
  • Inter-protocol communication
  • Connecting FTP through HTTP service
  • Getting remote shell using Beef bind etc

[download]CLICK HERE TO DOWNLOAD [/download]

Posted: November 11, 2015
Jatin Jain
View Profile

With versatile experience in Information Security domain, he has successfully proven himself in Information Security Audit, Web Application Audit, Vulnerability Assessment, Penetration Testing/ Ethical Hacking and also acted as corporate trainer. Have served different government and private organization and provided best security services. Also he has been awarded from world's best organization like Face book, Apple, etc for providing best security support to them. He included his name in worldwide recognized various hall of fame as well as written article for famous PenTest, Hackin9 Magazine.