CHAPTER 3

Scanning and Enumeration

This chapter includes questions from the following topics:

•   Understand EC-Council’s scanning methodology

•   Describe scan types and the objectives of scanning

•   Understand the use of various scanning and enumeration tools

•   Describe TCP communication (three-way handshake and flag types)

•   Understand basic subnetting

•   Understand enumeration and enumeration techniques

•   Describe vulnerability scanning concepts and actions

•   Describe the steps involved in performing enumeration

I love fishing. Scratch that—a better statement is that I am addicted to fishing. I dream about it. I think about it during my workday, I plan my weekends around it—heck, I even decorated my office with fishing paraphernalia, ...

Get CEH Certified Ethical Hacker Practice Exams, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.