-
Book Overview & Buying
-
Table Of Contents
CEH v10 Certified Ethical Hacker Study Guide
By :
THE FOLLOWING CEH TOPICS ARE COVERED IN THIS CHAPTER:
Technical assessment methods
Port scanning
Privacy and confidentiality
Data analysis
Vulnerability scanning
It’s commonly believed that attackers do a lot of work up front before launching attacks. They get a sense of how large the attack surface is and where their targets are. This can take a lot of work, using a lot of different tool and skill sets. The process of getting the size and scope of the target is called footprinting—in other words, the attacker, or you, the ethical hacker, is trying to pick up the footprint of the target organization. When it comes to ethical hacking, you may have some help from the target, who would have employed you for your services. They may provide you with some footholds to get a sense of the scope and scale of what you should be doing. It’s possible, though, that you are starting...
Change the font size
Change margin width
Change background colour