December 2016
Beginner
360 pages
9h
English
Once you have gathered information about your target, it is time to move on to scanning and enumeration. Scanning includes ping sweeping, port scanning, and vulnerability scanning. Enumeration is the process of extracting meaningful information from the openings and information you found during scanning, such as usernames, share data, group information, and much more.
In this chapter, you’ll learn to:
Scanning is a pretty broad term; it’s a sort of catchall term covering many different techniques, all of which are some form of scan type.