Home > Articles

This chapter is from the book

Review All Key Topics

Review the most important topics in this chapter, noted with the Key Topic icon in the outer margin of the page. Table 3-9 lists a reference of these key topics and the page numbers on which each is found.

key_topic_icon.jpg

Table 3-9 Key Topics for Chapter 3

Key Topic Element

Description

Page Number

Figure 3-1

Footprinting and Scanning Steps

93

Section

Footprinting Methodology

93

Paragraph/list

Advanced Google hacking

98

Paragraph

Using Shodan to find vulnerable systems

100

Section

Footprinting Through Social Networking Sites

101

Section

Network Footprinting

118

Section

Footprinting Countermeasures

122

Section

Host Discovery

123

Section

Port and Service Discovery

124

Table 3-7

TCP Flag Types

126

Section

OS Discovery (Banner Grabbing/OS Fingerprinting) and Scanning Beyond IDS and Firewall

141

Section

Finding Open Services

145

Figure 3-12

A Network Diagram of Discovered Devices and Applications

149

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.