O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 2

Reconnaissance: Information Gathering for the Ethical Hacker

In this chapter you will

•  Define active and passive footprinting

•  Identify methods and procedures in information gathering

•  Understand the use of social networking, search engines, and Google hacking in information gathering

•  Understand the use of whois, ARIN, and nslookup in information gathering

•  Describe the DNS record types

I was watching a nature show on TV a couple nights back and saw a lion pride hunt from start to finish. The actual end was totally awesome, if a bit gruesome, with a lot of neck biting and suffocation, followed by bloody chewing. But the buildup to that attack was different altogether. In a way, it was visually…boring. But if you watched ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required