O'Reilly logo

Ethical Hacking and Penetration Testing Guide by Rafay Baloch

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4Target Enumeration and Port Scanning Techniques

In this chapter we will discuss various methods for enumerating and scanning a target or goal to gain as much information about the alive targets on a network as possible. This is also part of the information gathering phase, which, as I had mentioned, is key to a successful pentest. This chapter is very essential and is a building block for penetration testers, because later in Chapter 7 you will realize how the information we have gathered in this chapter helps us to compromise targets.

The main goal of this chapter is to learn the following:

  • Host discovery
  • Scanning for open ports
  • Service and version detection
  • OS detection
  • Bypassing firewalls

We will use a variety of tools in demonstrating ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required