© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
K. A. CochranCybersecurity Essentialshttps://doi.org/10.1007/979-8-8688-0432-8_4

4. Scanning and Enumeration

Kodi A. Cochran1  
(1)
Infrastructure, WV Dept of Shared Administration, Charleston, WV, USA
 

As we move forward and begin Chapter 4, we will begin to venture into more of the active phases of the process. As with all phases, this is a largely important process of the practice and must be taken with extreme preparation, caution, and understanding of the materials. This phase is where the possibility of incidentally crossing the boundary of the agreed scope of testing can have severe legal or even economic consequences.

Introduction to Scanning Techniques ...

Get Cybersecurity Essentials: Practical Tools for Today's Digital Defenders now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.