This chapter covers the following topics:
Enumeration: The process of counting off or listing what services, applications, and protocols are present on each identified computer.
System Hacking: The process of gaining access, escalating privileges, maintaining control, and covering tracks.
This chapter introduces enumeration and system hacking. It gives you the knowledge you need to prepare for the Certified Ethical Hacker exam, and it broadens your knowledge of operating system (OS) security controls ...