Skip to Content
Penetration Testing Essentials
book

Penetration Testing Essentials

by Sean-Philip Oriyano
December 2016
Beginner
360 pages
9h
English
Sybex
Content preview from Penetration Testing Essentials

CHAPTER 6 Scanning and Enumeration

Once you have gathered information about your target, it is time to move on to scanning and enumeration. Scanning includes ping sweeping, port scanning, and vulnerability scanning. Enumeration is the process of extracting meaningful information from the openings and information you found during scanning, such as usernames, share data, group information, and much more.

In this chapter, you’ll learn to:

  • Do a ping sweep
  • Perform port scanning
  • Identify an operating system
  • Look for vulnerabilities
  • Use a proxy
  • Perform enumeration

Introduction to Scanning

Scanning is a pretty broad term; it’s a sort of catchall term covering many different techniques, all of which are some form of scan type.

  • A ping sweep checks ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Penetration Testing

Penetration Testing

James Hayes, Nick Furneaux, Jims Marchang, Rob Ellis, Jason Charalambous, Moinuddin Zaki, Peter Taylor, Roderick Douglas, Felix Ryan, Ceri Charlton, Gemma Moore, Tylor Robinson, Sharif Gardner
Penetration Testing

Penetration Testing

Georgia Weidman
Penetration Testing: A Survival Guide

Penetration Testing: A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran

Publisher Resources

ISBN: 9781119235309Purchase Link