ETHICAL HACKING KATACODA SCENARIOS

by Omar and Derek Santos

Active Recon and Scanning

Intro to Network Scanning

Introducing Network and Port Scanning using Nmap

Advanced Port Scanning

Advanced Nmap Scanning and the Nmap Scripting Engine

Nikto

Web Application Vulnerability Scanning with Nikto

Sniffing and Packet Capture

Capturing and Analyzing Packets with TShark and TCPDump

Scanning Docker Containers with Grype

Scanning Docker Containers with Grype

Scanning Containers with Trivy

Web Application Vulnerability Scanning with Nikto

Enumerating and Fuzzing Applications Using FFUF

Ethical Hacking: Active Recon - Fuzzing web applications using the FFUF fuzzer

Application Reconnaissance Using Gobuster

Ethical Hacking: Active Recon - Application reconnaissance using gobuster

Enumeration and Fuzzing with Feroxbuster

Ethical Hacking: Active Recon - Enumeration and Fuzzing with Feroxbuster

Enumerating and Fingerprinting Systems and Applications

Additional Tips for Enumerating and Fingerprinting Systems and Applications