CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Define the terms port scanning, network scanning, and vulnerability scanning
Understand the CEH scanning methodology
Understand ping sweep techniques
nmap command switches
Understand SYN, stealth, XMAS, NULL, IDLE, and FIN scans
List TCP communication flag types
Understand war-dialing techniques
Understand banner grabbing and OS fingerprinting techniques
Understand how proxy servers are used in launching an attack
How do anonymizers work?
Understand HTTP tunneling techniques
Understand IP spoofing techniques
What is enumeration?
What is meant by null sessions?
What is SNMP enumeration?
What are the steps involved in performing enumeration? ...