Skip to Content
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide
book

Certified Ethical Hacker (CEH) v12 312-50 Exam Guide

by Dale Meredith
July 2022
Intermediate to advanced
664 pages
15h 56m
English
Packt Publishing
Content preview from Certified Ethical Hacker (CEH) v12 312-50 Exam Guide

Chapter 5: Enumeration

Enumeration is interesting. It does something that we typically don't want to happen. It makes systems behave abnormally or in a way that we wouldn't expect them to. Steve Wozniak, one of Apple's founders, said that a lot of hacking is playing with other people, you know, getting them to do strange things, and that's exactly what enumeration does for us. Enumerating is a core part of evaluating any target. An enumeration can be as simple as running a reverse DNS lookup on an IP address, or as complex as the entire OSINT process being run on a target. Enumerating a target is one of the most important steps in penetration testing. The goal of performing enumeration on a network is to gather as much information about the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Certified Ethical Hacker (CEH) Study Guide

Certified Ethical Hacker (CEH) Study Guide

Matt Walker
Certified Ethical Hacker (CEH) v.12

Certified Ethical Hacker (CEH) v.12

ACI Learning, Daniel Lowrie, Sophie Goodwin

Publisher Resources

ISBN: 9781801813099