Chapter 4Enumeration and System Hacking

This Chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering the following EC-Council objectives, which include understanding the business aspects of penetration testing. This includes items such as

Understand basic Windows architecture

Image Contains two basic modes: user and kernel.

Know basic Windows enumeration techniques

Image Enumeration involves directed queries against specific systems to identify shares, users, and account information.

Specify how IPC$ can be exploited ...

Get Certified Ethical Hacker Exam Prep now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.