CHAPTER 6 Scanning and Enumeration

Once you have gathered information about your target, it is time to move on to scanning and enumeration. Scanning includes ping sweeping, port scanning, and vulnerability scanning. Enumeration is the process of extracting meaningful information from the openings and information you found during scanning, such as usernames, share data, group information, and much more.

In this chapter, you’ll learn to:

  • Do a ping sweep
  • Perform port scanning
  • Identify an operating system
  • Look for vulnerabilities
  • Use a proxy
  • Perform enumeration

Introduction to Scanning

Scanning is a pretty broad term; it’s a sort of catchall term covering many different techniques, all of which are some form of scan type.

  • A ping sweep checks ...

Get Penetration Testing Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.