CHAPTER 4

Scanning, Enumeration, and Vulnerability Identification

In this chapter you will learn how to

•   Map networks

•   Use basic network protocol functionality to perform reconnaissance

•   Perform host discovery, port scanning, version identification, and OS fingerprinting

•   Perform vulnerability scanning

•   Use tools like hping3, arp-scan, nmap, Zenmap, rpcclient, enum4linux, and Nessus

After using OSINT techniques for information gathering (as described in Chapter 3), now it’s time to gain even more specific information about the target environment. At this point, an attacker would start interacting with your network (something that you may sometimes see happening or often enough may go unnoticed, depending on the specific techniques ...

Get GCIH GIAC Certified Incident Handler All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.