CHAPTER 3
Scanning and Enumeration
In this chapter you will
• Understand EC-Council’s scanning methodology
• Describe scan types and the objectives of scanning
• Understand the use of various scanning and enumeration tools
• Describe TCP communication (three-way handshake and flag types)
• Understand basic subnetting
• Understand enumeration and enumeration techniques
• Describe vulnerability scanning concepts and actions
• Describe the steps involved in performing enumeration
Remember before Covid-19, when we could all go out to a movie theater, eat overpriced popcorn, and enjoy a summer blockbuster? Well, jump in the Wayback Machine with me and Mr. Peabody, and let’s imagine this is a movie instead of a book, about a guy beginning ...
Get CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.