Chapter 3. Scanning and Enumeration
Step with me, dear reader, into a virtual movie theater and let’s imagine we’re going to watch a movie about a guy beginning a career in ethical hacking. At some point, probably during the previews for Deadpool and Wolverine, someone’s cell phone rings and we all momentarily flash with unbridled rage before going back to the screen. The opening credits roll, showing us that this is a story about a young man deciding to put his hacker training to use. In the first scenes he’s researching vulnerabilities and keeping track of the latest news, checking on websites, and playing with tools in his secret lab. Soon thereafter, he gets his first break and signs a contract to test a client—a client holding a secret that could change the very fabric of modern society.
Before we’re even halfway through the buttered popcorn, he has completed some footprinting work and has tons of information on potential targets. Some of what he finds seems harmless enough, while some ...
Get Certified Ethical Hacker (CEH) Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.