Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks Audiobook By Dr. Hidaia Mahmood Alassouli cover art

Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks

Virtual Voice Sample
Try for $0.00
Prime logo Prime members: New to Audible?
Get 2 free audiobooks during trial.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for $14.95/mo after 30 days. Cancel anytime.

Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks

By: Dr. Hidaia Mahmood Alassouli
Narrated by: Virtual Voice
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $8.00

Buy for $8.00

Confirm purchase
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use, License, and Amazon's Privacy Notice. Taxes where applicable.
Cancel
Background images

This title uses virtual voice narration

Virtual voice is computer-generated narration for audiobooks.

About this listen

Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system. During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible. Footprinting refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. An Ethical hacker has to spend the majority of his time in profiling an organization, gathering information about the host, network and people related to the organization. Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected. Network scanning is used to recognize available network services, discover and recognize any filtering systems in place, look at what operating systems are in use, and to protect the network from attacks. It can also be used to determine the overall health of the network. Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system. The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit in the System gaining phase. The objective of the report is to explain to the user Footprinting, Reconnaissance, Scanning and Enumeration techniques and tools applied to computer networks The report contains of the following parts: • Part A: Lab Setup • Part B: Foot printing and Reconnaissance • Part C: Scanning Methodology • Part D: Enumeration Security & Encryption Technology Software Hacking Programming Computer Security
adbl_web_global_use_to_activate_T1_webcro805_stickypopup
No reviews yet