CHAPTER 2

Reconnaissance: Information Gathering for the Ethical Hacker

This chapter includes questions from the following topics:

•   Define active and passive footprinting

•   Identify methods and procedures in information gathering

•   Understand the use of social networking, search engines, and Google hacking in information gathering

•   Understand the use of whois, ARIN, and nslookup in information gathering

•   Describe DNS record types

Criminology (the study of the nature, causes, control, and prevention of criminal behavior) is a fascinating subject, and although we’re concentrating on the virtual world in this book, it’s amazing how much footprinting is done in the physical criminal world as well. Most of us have already heard a million ...

Get CEH Certified Ethical Hacker Practice Exams, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.