CHAPTER 3

Scanning and Enumeration

In this chapter you will

•  Understand EC-Council’s scanning methodology

•  Describe scan types and the objectives of scanning

•  Understand the use of various scanning and enumeration tools

•  Describe TCP communication (three-way handshake and flag types)

•  Understand basic subnetting

•  Understand enumeration and enumeration techniques

•  Describe vulnerability scanning concepts and actions

•  Describe the steps involved in performing enumeration

Imagine this is a movie instead of a book, about a guy beginning a career in ethical hacking. At some point, probably during the previews for Batman v Superman, someone’s cell phone will ring and we all momentarily flash with unbridled rage before going back to ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.