5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     EC-Council     Certified Ethical Hacker (CEH)     Certified Ethical Hacker (CEH) v11

Having the correct time helps to ensure systems operate properly, especially if you have configured things like time-based access. In this course, you'll explore the Network Time Protocol, including attributes and enumeration tools. You'll also examine the Network File System and how it can be taken advantage of when implemented incorrectly. Finally, you'll learn about the Simple Mail Transfer Protocol (SMTP) and File Transfer Protocol (FTP), including what details can be enumerated from target systems using both of these protocols. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEH v11: NTP, NFS, SMTP & FTP Enumeration

  • describe the tools that can be used to enumerate NTP
  • recognize the purpose of the Network Time Protocol (NTP)
  • describe the Network File System (NFS)
  • mount NFS mount points from a remote system on a local system
  • recognize how to detect NFS file systems on remote systems
  • recognize how to access or find SMTP and FTP services on a target system
  • recognize how to verify user accounts on target systems running Simple Mail Transfer Protocol (SMTP)
  • recognize tools that can be used to enumerate details from target systems running SMTP