📖[PDF] Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks by Hedaia Mahmood Al-Assouli | Perlego
Get access to over 700,000 titles
Start your free trial today and explore our endless library.
Join perlego now to get access to over 700,000 books
Join perlego now to get access to over 700,000 books
Join perlego now to get access to over 700,000 books
Join perlego now to get access to over 700,000 books
Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks
Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks
📖 Book - PDF

Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks

Hedaia Mahmood Al-Assouli
shareBook
Share book
language
English
format
ePUB (mobile friendly) and PDF
availableOnMobile
Available on iOS & Android
📖 Book - PDF

Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks

Hedaia Mahmood Al-Assouli
Book details
Table of contents
Citations

About This Book

Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system. During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible.

Footprinting refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. An Ethical hacker has to spend the majority of his time in profiling an organization, gathering information about the host, network and people related to the organization. Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected.

Network scanning is used to recognize available network services, discover and recognize any filtering systems in place, look at what operating systems are in use, and to protect the network from attacks. It can also be used to determine the overall health of the network.

Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system.The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit in the System gaining phase.

The objective of the report is to explain to the user Footprinting, Reconnaissance, Scanning and Enumeration techniques and tools applied to computer networks

The report contains of the following parts:

Part A: Lab Setup

Part B: Foot printing and Reconnaissance

Part C: Scanning Methodology

Part D: Enumeration

Read More

Information

Publisher
Dr. Hedaia Mahmood Al-Assouli
Year
2021
ISBN
9791220281775
Topic
Computer Science
Subtopic
Cyber Security
Edition
1

Table of contents