O'Reilly logo

CEH® Certified Ethical Hacker Study Guide by Kimberly Graves

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering

CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • Define the term footprinting

  • Describe information-gathering methodology

  • Describe competitive intelligence

  • Understand DNS enumeration

  • Understand Whois, ARIN lookup

  • Identify different types of DNS records

  • Understand how traceroute is used in footprinting

  • Understand how email tracking works

  • Understand how web spiders work

  • What is social engineering?

  • What are the common types of attacks?

  • Understand dumpster diving

  • Understand reverse social engineering

  • Understand insider attacks

  • Understand identity theft

  • Describe phishing attacks

  • Understand online scams

  • Understand URL obfuscation

  • Social-engineering countermeasures

A hacker uses information-gathering ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required