O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we discussed the target enumeration and its purpose. We also discussed port scanning as one of the target enumeration methods. You learned about several types of port scanning, and then we looked at several tools, such as AutoScan, Nmap, Unicornscan, to carry out port scanning process. We also discussed service enumeration and the tools to do that, such as Amap, Httprint, and Httsquash. Lastly, we talked about VPN enumeration and the ike-scan as the tool to carry out this process.

In next chapter, we will look at the vulnerability identification, a process of identifying and analyzing the critical security flaws in the target environment.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required