O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition, 2nd Edition by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
2
Reconnaissance: Information Gathering for the Ethical Hacker
In this chapter you will
•  Define active and passive footprinting
•  Identify methods and procedures in information gathering
•  Understand the use of whois, ARIN, and nslookup
•  Describe DNS record types
•  Define and describe Google hacking
•  Use Google hacking in footprinting
image
Many, many years ago I sold vacuum cleaners door to door. Our setup was actually pretty salesman friendly: The office set all the appointments, and, at the end of every demo, we offered a prize and a percentage ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required