Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Sports
Technology
History
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c6/69/cc/c669cc1e-30b6-2ee8-57a2-1a356338f475/mza_5498275658329189582.jpg/600x600bb.jpg
Learn As I Learn - Technology, Product and Cybersecurity
Akanksha Pathak
57 episodes
5 days ago
No time to learn? Take out few minutes from your life and learn new things every day! Please subscribe to start learning for FREE now!
Show more...
Education
RSS
All content for Learn As I Learn - Technology, Product and Cybersecurity is the property of Akanksha Pathak and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
No time to learn? Take out few minutes from your life and learn new things every day! Please subscribe to start learning for FREE now!
Show more...
Education
https://d3t3ozftmdmh3i.cloudfront.net/production/podcast_uploaded/4732411/4732411-1587053849816-c6c798440b069.jpg
Series 4: Ep 4: Linux Reconnaissance
Learn As I Learn - Technology, Product and Cybersecurity
13 minutes 26 seconds
3 weeks ago
Series 4: Ep 4: Linux Reconnaissance

Explore active information gathering in Linux! This episode teaches you how to enumerate a vulnerable Bee-Box machine using Kali Linux tools. You'll learn Nmap for identifying open ports and services, and Metasploit for deeper SMTP enumeration, strengthening your reconnaissance skills.

Link: Bee-Box official download page

Commands: nmap -Pn -sS –sV <Bee-Box IP Address>

nmap -Pn -sS -sV -p 25 <Bee-Box IP Address>

auxiliary/scanner/smtp/smtp_enum

set RHOSTS <IP of the Bee-Box>

set THREADS <Number of Logical Processors>

Learn As I Learn - Technology, Product and Cybersecurity
No time to learn? Take out few minutes from your life and learn new things every day! Please subscribe to start learning for FREE now!