CEH
Drawing Network Diagrams 119 Vulnerability Scanning So how do you find all the vulnerabilities that exist in an environment, esp ...
120 Chapter 5 ■ Scanning Networks Network mappers combine the scanning and sweeping techniques explained in this chapter to buil ...
Using Proxies 121 Proxy servers are typically used to maintain anonymity, which helps scanners. A vigilant network administrator ...
122 Chapter 5 ■ Scanning Networks So how does it work? Again, let’s let the developer describe the process (from the same websit ...
Review Questions 123 Review Questions Which of the following is used for banner grabbing? A. Tel net B. FTP C. SSH D. Wireshar ...
124 Chapter 5 ■ Scanning Networks What is missing from a half-open scan? A. SYN B. ACK C. SY N-ACK D. FIN During an FIN scan, w ...
Review Questions 125 What is an ICMP Echo scan? A. A ping sweep B. A SYN scan C. A Xmas scan D. Part of a UDP scan Which best ...
126 Chapter 5 ■ Scanning Networks A banner can? A. Identify an OS B. Help during scanning C. Identify weaknesses D. Identify a ...
Enumeration of Services CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER: ✓ III. Security ■ P. Vulnerabilities ✓ IV. Tools/Systems/Pr ...
You’ve gathered a lot of information up to this point. Now it’s time to start exploring the target system more closely with the ...
What Is Enumeration? 129 During this phase you use techniques such as: ■ Pings ■ Ping sweeps ■ Port scans ■ Tracert Processes un ...
130 Chapter 6 ■ Enumeration of Services So what options are available to an attacker performing enumeration? Let’s take a look a ...
Windows Basics 131 is the user account. User accounts are used in Windows for everything from accessing file shares to running s ...
132 Chapter 6 ■ Enumeration of Services Network Any user accessing the system through a network has the Network identity, which ...
Windows Basics 133 TCP 139 NetBIOS Session Service, also known as SMB over NetBIOS, lets you manage connections between NetBIOS- ...
134 Chapter 6 ■ Enumeration of Services One step in gaining a foothold in a Windows system is exploiting the NetBIOS API. This s ...
Windows Basics 135 ■ -n Names: Displays the names registered locally by NetBIOS applications such as the server and redirector ■ ...
136 Chapter 6 ■ Enumeration of Services Note that the ipc$ share is the IPC share. To view the shares available on a particular ...
Enumeration with SNMP 137 The PsTools Suite Standing tall next to our other tools is a suite of Microsoft tools designed to extr ...
138 Chapter 6 ■ Enumeration of Services SNMPv2 This version introduced new management functions as well as security features tha ...
«
4
5
6
7
8
9
10
11
12
13
»
Free download pdf