Abstract
Before planning an attack on the target system or network, it is very important to have detailed information about the target system. This information includes software versions, type of operating system installed, a list of active services, a list of user accounts, and so on. This information helps plan and build or prevent further attacks on the target system. This chapter introduces various footprinting and enumeration techniques that are useful in gathering vital information about the target system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Sagar Ajay Rahalkar
About this chapter
Cite this chapter
Rahalkar, S.A. (2016). Information Gathering. In: Certified Ethical Hacker (CEH) Foundation Guide. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2325-3_8
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2325-3_8
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2324-6
Online ISBN: 978-1-4842-2325-3
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books