Scanning and Enumeration Phase

Scanning and Enumeration Phase

ISBN13: 9781522576280|ISBN10: 1522576282|EISBN13: 9781522576297
DOI: 10.4018/978-1-5225-7628-0.ch006
Cite Chapter Cite Chapter

MLA

Sunita Vikrant Dhavale. "Scanning and Enumeration Phase." Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, IGI Global, 2019, pp.149-177. https://doi.org/10.4018/978-1-5225-7628-0.ch006

APA

S. Dhavale (2019). Scanning and Enumeration Phase. IGI Global. https://doi.org/10.4018/978-1-5225-7628-0.ch006

Chicago

Sunita Vikrant Dhavale. "Scanning and Enumeration Phase." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7628-0.ch006

Export Reference

Mendeley
Favorite

Abstract

In ethical hacking, the reconnaissance phase is followed by the scanning and enumeration phase where the information collected from reconnaissance phase is used to examine the target or target network further for getting specific details such as computer names, IP addresses, open ports, user accounts, running services, OS details, system architecture, vulnerabilities, etc. This chapter introduces different scanning and enumeration tools used in the scanning phase of the ethical hacking process in detail. One may use scanning and enumeration tools and techniques involving packet crafting tools, packet analyzers, port scanners, network mappers, sweepers, and vulnerability scanners during this phase. The chapter introduces tools like Hping3, NMAP security scanner, Colasoft packet builder to create custom packets, vulnerability scanners such as Nessus, Netbios enumeration technique, Hyena, remote administration of network devices using advanced IP scanner, global network inventory, network mapping using the dude network monitor, banner grabbing using ID serve, SNMP enumeration technique, creating NetBIOS null session to enumerate, etc. The chapter also provides the details of maintaining privacy and anonymity while carrying out such scanning and enumeration attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.