Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Uploaded on Oct 12, 2010
DISCLAIMER : This video is not meant to incitate its viewers to reproduce the methods shown in it against a computer they do not own without the permission of its owner(s) to do so. DoS and DDoS attacks are not mentioned either.
This video is about scanning a known IP to get information about the layout of its eventual network, the open connections, the filters/firewalls filtering them and the software its machine(s) run.
-Port scanning generalities -Installing Nmap -Basic commands -Mapping hosts and ports, application and OS fingerprinting -Bypassing firewalls, SYN, TCP connect, SCTP, ACK, IP scans -Custom packet flags -IP and MAC spoofing, other commands