Chapter 4Target Enumeration and Port Scanning Techniques
In this chapter we will discuss various methods for enumerating and scanning a target or goal to gain as much information about the alive targets on a network as possible. This is also part of the information gathering phase, which, as I had mentioned, is key to a successful pentest. This chapter is very essential and is a building block for penetration testers, because later in Chapter 7 you will realize how the information we have gathered in this chapter helps us to compromise targets.
The main goal of this chapter is to learn the following:
- Host discovery
- Scanning for open ports
- Service and version detection
- OS detection
- Bypassing firewalls
We will use a variety of tools in demonstrating ...
Get Ethical Hacking and Penetration Testing Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.