Back to Browse

Penetration Testing: NMAP, Enumeration, Scanning, and Exploitation

62 views
Feb 17, 2026
4:17

It isn't enough to know the phases; you have to master the mechanics. In this video, Sec Guy goes deep into the offensive toolkit. We move from Passive Reconnaissance to Active Scanning with Nmap and hping3, explain how to poison networks with Responder, and show you how to automate SQL Injection with SQLMap. If you are studying for CEH or PenTest+, this is your tactical field guide. [Exam Ready Route - FREE] Pass your certification for $0. ✅ Training Videos & Practice Tests ✅ Sec Guy Mobile Lab (On-the-go training powered by AI voice) ✅ Discord Access (Study sessions & Industry networking) 👉 Start Here: https://secguy.org [Job Ready Route - MEMBERSHIP] Stop studying and start working. Get the hands-on experience hiring managers are asking for. 🔥 Hands-On Labs: Python, Encryption, Hashing, AI, & CTFs 🔥 Salary Negotiator Workshop 🔥 Experience Builder: Real-world projects to fill your resume 👉 Get Hired: https://secguy.org [Exam Domain Checklist] This video covers critical objectives for the following exams: Security+ [ ] Domain 4.2: Security Operations (Vulnerability Scanning vs. Penetration Testing) [ ] Domain 2.2: Vulnerabilities (SQL Injection, XSS) CISSP [ ] Domain 6: Security Assessment and Testing (Penetration Testing Methodologies) CISM [ ] Domain 3: Information Security Program (Managing Technical Assessments) CRISC [ ] Domain 2: IT Risk Assessment (Technical Vulnerabilities & Exploits) CCSP [ ] Domain 4: Cloud Application Security (OWASP Testing) SecurityX (CompTIA) [ ] Domain 3.0: Security Operations (Advanced Enumeration & Exploitation) GIAC GSEC (SANS) [ ] Penetration Testing: Tools & Techniques (Nmap, Metasploit) AWS CSS (Certified Security – Specialty) [ ] Domain 1: Threat Detection (Recognizing Port Scanning & Enumeration) Pentest+ (CompTIA) [ ] Domain 3: Attacks and Exploits (Network Attacks, Web App Attacks, Wireless Attacks) [ ] Domain 2: Information Gathering (Nmap, Enumeration) CEH (Certified Ethical Hacker) [ ] Domain 3: Scanning Networks (Nmap, Hping3) [ ] Domain 4: Enumeration (SNMP, SMB, RPC) [ ] Domain 10: Web Server Hacking (SQLMap, XSS) SecAI+ [ ] AI Security: Automating Vulnerability Scanning with AI Agents [Timestamps] 0:00 - Intro: From Passive Observer to Active Explorer 0:23 - Scanning: Packet Crafting with Hping3 & Nmap (Idle Scans) 0:40 - Enumeration: Extracting Usernames via SNMP, RPC, and SMB (Enum4Linux) 1:16 - System Hacking: Cracking Passwords & Escalating Privileges 1:26 - Network Poisoning: LLMNR/NBT-NS with Responder 1:37 - Password Cracking: Hashcat & John the Ripper 1:53 - Web App Hacking: SQL Injection (SQLMap) & XSS (BeEF) 2:24 - Wireless Hacking: Aircrack-ng (WPA2 Handshakes) & Reaver (WPS) 2:49 - Mobile & IoT: ADB & MobSF (APK Analysis) 3:00 - Cloud Exploitation: S3 Buckets & Container Escape 3:16 - Post-Exploitation: Clearing Tracks (Shred Command & Event Viewer) 3:39 - Outro: Get the Reps In.

Download

0 formats

No download links available.

Penetration Testing: NMAP, Enumeration, Scanning, and Exploitation | NatokHD