Chapter 3. Gathering Network and Host Information: Scanning and Enumeration

CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • Define the terms port scanning, network scanning, and vulnerability scanning

  • Understand the CEH scanning methodology

  • Understand ping sweep techniques

  • Understand nmap command switches

  • Understand SYN, stealth, XMAS, NULL, IDLE, and FIN scans

  • List TCP communication flag types

  • Understand war-dialing techniques

  • Understand banner grabbing and OS fingerprinting techniques

  • Understand how proxy servers are used in launching an attack

  • How do anonymizers work?

  • Understand HTTP tunneling techniques

  • Understand IP spoofing techniques

  • What is enumeration?

  • What is meant by null sessions?

  • What is SNMP enumeration?

  • What are the steps involved in performing enumeration? ...

Get CEH® Certified Ethical Hacker Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.