5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Internet and Network Technologies Solution Area     Security Solutions     Certified Ethical Hacker (CEH) v11

Staying off of the radar of your target's security team is a common goal for many ethical hackers when performing security assessments. In this course, you'll learn to use the Nmap IDLE/IPID scan to take advantage of other network hosts to obfuscate scan origins from detection systems and logs. You'll explore using Nmap to discover what is utilizing UDP to help you add to your list of possible inroads of a target system. You'll also examine how SCTP works and how to work with Nmap to use it for scanning purposes. Finally, you'll learn about using Nmap's IPv6 option as another way to discover open ports and about using the versioning option to learn more about the service running on open ports. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: Nmap IP Scans

  • identify the IP fields being used during a zombie scan
  • recognize techniques used to avoid detection when performing a scan
  • recognize the syntax to perform an idle scan with nmap
  • identify the nmap command to perform a UDP scan
  • recognize how a system responds to a UDP scan
  • identify the number of steps to the SCTP handshake
  • recognize the nmap command to perform an INIT SCTP scan
  • identify the nmap command to determine the version of software running on a port
  • recognize how to enable IPv6 scanning in nmap