Scanning and Enumeration

In this chapter you will

•  Understand EC-Council’s scanning methodology

•  Describe scan types and the objectives of scanning

•  Understand the use of various scanning and enumeration tools

•  Describe TCP communication (three-way handshake and flag types)

•  Understand basic subnetting

•  Understand enumeration and enumeration techniques

•  Describe vulnerability scanning concepts and actions

•  Describe the steps involved in performing enumeration

Imagine this is a movie instead of a book, about a guy beginning a career in ethical hacking. At some point, probably during the previews for Batman v Superman, someone’s cell phone will ring and we all momentarily flash with unbridled rage before going back to ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.