Don't Miss Any Course JoinTelegramRedditFacebook

Ethical Hacking: Web Enumeration

Ethical Hacking: Web Enumeration

Course overview

  • Manual Scanning
  • Scanning website for hidden directories
  • Scanning website for hidden files
  • Scanning for hidden subdomains

web enumeration is a techniques hackers use when targeting web servers and web sites. When attempting to hack an application with a vulnerabilty, you first have to find out what files, subdomains or directories the applications are vulnerable to. On top of that, you may find hidden files that could give you access to the file server. Perhaps you can access SSH keys, pdfs or find hidden directories. It might be there is a vulnerable app running on one of the sub domains. There are many ways the server could be accessible and web enumeration is the first step.

In this course you will learn how to scan for directories, files, subdomains but also how to scan blogs made with wordpress for vulnerabilities. While you can do manual scanning, that quickly becomes cumbersome. In this course we explain how you can do automated scans on your target server.

This is a beginners course for those interested in Ethical Hacking or Cyber Security. You don’t need any prior knowledge when doing this course, but you should have Kali Linux at hands. Kali Linux is a computer system that contains many hacking tools, sometimes it’s simply called Kali. It can be downloaded for free as a Live USB or Virtualbox image, there’s also a cloud option. While you can install the tools manually, there are so many hacking tools that it’s easier to use a dedicated Linux system like Kali.

Who this course is for:

  • Beginner Ethical Hackers
  • Software Developers
  • Sysadmins
  • Devops
Ethical Hacking: Web Enumeration
Scan your target before hacking
$0 $19.99

We will be happy to hear your thoughts

Leave a reply

Freewebcart
Logo
Reset Password
Compare items
  • Total (0)
Compare
0
1