CEH
Review Questions 99 Which of the following can an attacker use to determine the technology within an organi- zation? A. Job boa ...
100 Chapter 4 ■ Footprinting and Reconnaissance What can be configured in most search engines to monitor and alert you of chang ...
Review Questions 101 Footprinting has two phases: A. Active and pseudonomyous B. Active and passive C. Social and anonymous D. ...
...
Scanning Networks CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER: ✓ II. Analysis/Assessment ■ B. Systems analysis ✓ III. Security ■ ...
Once you’ve completed the footprinting phase and you’ve gath- ered a good amount of information about your target, it’s time to ...
What Is Network Scanning? 105 It is not unknown for an ethical hacker to engage in the network scanning phase and emerge with a ...
106 Chapter 5 ■ Scanning Networks Vulnerability Scan A vulnerability scan is used to identify weaknesses or vulnerabilities on a ...
Checking for Live Systems 107 Modems and dial-up are still used as a backup to existing technologies such as cable, digital subs ...
108 Chapter 5 ■ Scanning Networks You will be questioned about wardialing on the CEH exam since it is a valid mechanism for atta ...
Checking for Live Systems 109 To use the ping command in Windows, enter the following at the command prompt, ping or: ping In ...
110 Chapter 5 ■ Scanning Networks Ping sweeps are incredibly effective in that they can build an inventory of systems quickly; h ...
Checking for Open Ports 111 TA B LE 5.1 TCP flags Flag Use SYN Initiates a connection between two hosts to facilitate communicat ...
112 Chapter 5 ■ Scanning Networks This information can be helpful in many areas, especially when you are using a packet crafter. ...
Types of Scans 113 The advantage of this type of scanning is that it is less likely to trigger detection mechanisms, but the dow ...
114 Chapter 5 ■ Scanning Networks To perform an Xmas tree scan with Nmap, enter the following at the command line: NMAP –sX –v & ...
Types of Scans 115 In Nmap to perform a NULL scan, issue the following command: NMAP –sN ACK Scanning Another interesting varia ...
116 Chapter 5 ■ Scanning Networks The first thing you must know is what happens in UDP scanning when a port is open or closed. T ...
Banner Grabbing 117 Banner Grabbing The first method of identifying a network we’ll explore is through a process known as banner ...
118 Chapter 5 ■ Scanning Networks If you look closely Figure 5.6, you will notice that the line marked server contains informati ...
«
3
4
5
6
7
8
9
10
11
12
»
Free download pdf