3

Ethical Hacking Scanning and Enumeration

After the footprinting phase, you will have gathered enough general information about the target to begin digging deeper to get the finer details about what you have found. This next stage, called the scanning and enumeration phase, takes some of the previously acquired information and processes it further. Here, we get information about the ports available, the running services, and the network.

In this chapter, we will determine what systems are on the network (also known as live systems) and reachable. We will also look at what systems listen for connections and discuss enumeration, using a variety of tools and techniques.

We will cover the following topics in this chapter:

  • Comparing scanning

Get Hands-On Ethical Hacking Tactics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.