image
2
Reconnaissance: Information Gathering for the Ethical Hacker
In this chapter you will
•  Define active and passive footprinting
•  Identify methods and procedures in information gathering
•  Understand the use of whois, ARIN, and nslookup
•  Describe DNS record types
•  Define and describe Google hacking
•  Use Google hacking in footprinting
image
Many, many years ago I sold vacuum cleaners door to door. Our setup was actually pretty salesman friendly: The office set all the appointments, and, at the end of every demo, we offered a prize and a percentage ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.