CHAPTER 3
Scanning and Enumeration
In this chapter you will
• Understand EC-Council’s scanning methodology
• Describe scan types and the objectives of scanning
• Understand the use of various scanning and enumeration tools
• Describe TCP communication (three-way handshake and flag types)
• Understand basic subnetting
• Understand enumeration and enumeration techniques
• Describe vulnerability scanning concepts and actions
• Describe the steps involved in performing enumeration
Imagine this is a movie instead of a book, about a guy beginning a career in ethical hacking. At some point, probably during the previews for Batman v Superman, someone’s cell phone will ring and we all momentarily flash with unbridled rage before going back to ...
Get CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.