Skip to Content
CEH Certified Ethical Hacker Cert Guide, 5th Edition
book

CEH Certified Ethical Hacker Cert Guide, 5th Edition

by Omar Santos, Michael Gregg
August 2025
Intermediate to advanced
917 pages
19h 41m
English
Pearson IT Certification
Content preview from CEH Certified Ethical Hacker Cert Guide, 5th Edition

Chapter 4

Enumeration and System Hacking Attack Techniques

This chapter covers the following topics:

  • Enumeration: Enumeration is the process of counting off or listing what services, applications, and protocols are present on each identified computer.

  • System Hacking: System hacking is the process of gaining access, escalating privileges, maintaining control, and covering tracks.

This chapter introduces enumeration and system hacking. It gives you the knowledge you need to prepare for the Certified Ethical Hacker exam, and it broadens your knowledge of operating system (OS) security controls and weaknesses. However, this chapter addresses only the basic information, because an entire book would be required to cover all system hacking issues. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

CEH Certified Ethical Hacker Cert Guide, 4th Edition

CEH Certified Ethical Hacker Cert Guide, 4th Edition

Michael Gregg, Omar Santos
CISSP Cert Guide, 5th Edition

CISSP Cert Guide, 5th Edition

Robin Abernathy, Darren R. Hayes

Publisher Resources

ISBN: 9780135485774