Footprinting, Scanning, and Enumeration


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Gathering information about a company, its network, and the servers, services, and ports that it uses and has open is a very important part of preparing for an attack on a network; but it is also tremendously important for an ethical hacker to take the same steps and to find the same weaknesses. This course will examine the steps taken to gather information, find a network range, network scanning and tools, enumeration techniques, and the countermeasures used against all of these. This course also assists students who are preparing for the EC Council’s Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience
Existing or in-training IT security professionals seeking detailed security penetration testing skills

Prerequisites
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration (hours)
2.5

Lesson Objectives

Footprinting, Scanning, and Enumeration

  • recognize how to use open source searching to gather information
  • recognize the role of RIR
  • recognize the purpose of NSlookup
  • sequence the TTL process
  • recognize how traceroute is used in footprinting
  • recognize how e-mail tracking works
  • identify port scanning issues
  • recognize how the TCP three-way handshake works
  • recognize the types of scans you can perform with Nmap
  • differentiate between war driving and war dialing
  • differentiate between active and passive fingerprinting
  • recommend a reconnaissance and scanning strategy for ethical hacking
  • recognize the difference between kernel mode and user mode in Windows NT systems
  • recognize how certain Windows elements affect security
  • recognize how to limit NetBIOS null session vulnerabilities
  • recognize how to counter SNMP vulnerabilities
  • recognize how to limit DNS zone transfer vulnerabilities
  • recognize how to use Active Directory enumeration
  • recommend a strategy for enumeration and for countering enumeration
  • Course Number:
    sp_etih_a02_it_enus