O'Reilly logo

CEH® Certified Ethical Hacker Study Guide by Kimberly Graves

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Gathering Network and Host Information: Scanning and Enumeration

CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • Define the terms port scanning, network scanning, and vulnerability scanning

  • Understand the CEH scanning methodology

  • Understand ping sweep techniques

  • Understand nmap command switches

  • Understand SYN, stealth, XMAS, NULL, IDLE, and FIN scans

  • List TCP communication flag types

  • Understand war-dialing techniques

  • Understand banner grabbing and OS fingerprinting techniques

  • Understand how proxy servers are used in launching an attack

  • How do anonymizers work?

  • Understand HTTP tunneling techniques

  • Understand IP spoofing techniques

  • What is enumeration?

  • What is meant by null sessions?

  • What is SNMP enumeration?

  • What are the steps involved in performing enumeration? ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required