Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks
()
About this ebook
Dr. Hidaia Mahmood Alassouli
I am Dr. Hidaia Mahmood Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from Gaza Strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http://www.anticorruption.000space.comI am an Author publishing books on kdp.amazon.comand many other book stores such as Google, Apple.com, writinglife.kobo.com, Lulu.com, feiyr.com, blurb.com, bookrix.com, barnesandnoble.com, notionpress.com, ingramspark.com and others . My personal website: http://www.hidaia-alassouli.000space.comMy Amazon Author Central: https://www.amazon.com/-/e/B07BH5HS7LEmail: [email protected]
Read more from Dr. Hidaia Mahmood Alassouli
Generation of Electrical Power Rating: 5 out of 5 stars5/5Introduction to Power System Protection Rating: 4 out of 5 stars4/5Electric Power Transmission: Lecture Notes of Electric Power Transmission Course Rating: 5 out of 5 stars5/5Reactive Power Compensation Rating: 0 out of 5 stars0 ratingsQuick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services Rating: 0 out of 5 stars0 ratingsWireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsSimulation of Some Power Electronics Case Studies in Matlab Simpowersystem Blockset Rating: 2 out of 5 stars2/5Signal, Audio and Image Processing Rating: 0 out of 5 stars0 ratingsDistribution of Electrical Power: Lecture Notes of Distribution of Electrical Power Course Rating: 0 out of 5 stars0 ratingsEarning Money: through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges Rating: 0 out of 5 stars0 ratingsConfiguration of a Simple Samba File Server, Quota and Schedule Backup Rating: 0 out of 5 stars0 ratingsEvaluation of Some Online Payment Providers Services: Best Online Banks and Visa/Master Cards Issuers Rating: 0 out of 5 stars0 ratingsSome Tutorials in Computer Networking Hacking Rating: 0 out of 5 stars0 ratingsCreating EPUB E-books Using EPUB Editors and Converters Rating: 0 out of 5 stars0 ratingsEvaluation of Some Virtual Phone Numbers Services Rating: 0 out of 5 stars0 ratingsMonitoring of Power System Quality Rating: 0 out of 5 stars0 ratingsCreation and Deployment of Smart Contracts on Ethereum Blockchain Rating: 0 out of 5 stars0 ratingsReview of the Specifications and Features of Different Smartphones Models Rating: 0 out of 5 stars0 ratingsQuick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory Rating: 0 out of 5 stars0 ratingsCreating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection Rating: 0 out of 5 stars0 ratingsStarting Guide for Postfix Mail Server Configuration Supporting Anti Spam and Anti Virus Rating: 0 out of 5 stars0 ratingsControl of DC Motor Using Different Control Strategies Rating: 0 out of 5 stars0 ratingsMethods for Increasing the Quality and Reliability of Power System Using FACTS Devices Rating: 0 out of 5 stars0 ratingsEvaluation of Some Text to Speech: Converters, Voice Changers, Video Editors, Animators, Speaking Avatar Makers and Live Streamers Rating: 0 out of 5 stars0 ratingsMethods to Overcome the Financial and Money Transfer Blockade against Palestine and any Country Suffering from Financial Blockade Rating: 0 out of 5 stars0 ratings
Related to Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks
Related ebooks
Hack into your Friends Computer Rating: 0 out of 5 stars0 ratingsPentesting for Beginners - Short Stories Rating: 0 out of 5 stars0 ratingsUltimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5HACKING WITH KALI LINUX: A Practical Guide to Ethical Hacking and Penetration Testing (2024 Novice Crash Course) Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker C.E.H v11 Exam Prep And Dumps Rating: 0 out of 5 stars0 ratingsBreaking Computer Network with Internet Rating: 0 out of 5 stars0 ratingsPenetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools Rating: 0 out of 5 stars0 ratingsEthical Hacking for All: Complete A to Z Tips and Tricks to Ethical Hacking Mastering Rating: 0 out of 5 stars0 ratingsMetasploit Penetration Testing Cookbook Rating: 0 out of 5 stars0 ratingsHacking of Computer Networks: Full Course on Hacking of Computer Networks Rating: 0 out of 5 stars0 ratingsWireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsHiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Rating: 0 out of 5 stars0 ratingsHow to Hack Like a GOD: Hacking the Planet, #2 Rating: 5 out of 5 stars5/5Ethical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsBurp Suite Essentials Rating: 4 out of 5 stars4/5Nmap 6: Network Exploration and Security Auditing Cookbook Rating: 0 out of 5 stars0 ratingsSome Tutorials in Computer Networking Hacking Rating: 0 out of 5 stars0 ratingsKali Linux, Ethical Hacking And Pen Testing For Beginners Rating: 0 out of 5 stars0 ratingsPenetration Testing Fundamentals -1: Penetration Testing Study Guide To Breaking Into Systems Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 4 out of 5 stars4/5Cybersafe for Business: The Anti-Hack Handbook for SMEs Rating: 0 out of 5 stars0 ratingsKali Linux Wireless Penetration Testing: Beginner's Guide Rating: 0 out of 5 stars0 ratingsPenetration Testing Bootcamp Rating: 5 out of 5 stars5/5How to Investigate Like a Rockstar: Hacking the Planet Rating: 0 out of 5 stars0 ratingsHack Computer System For Noobee Rating: 1 out of 5 stars1/5Kali Linux Intrusion and Exploitation Cookbook Rating: 5 out of 5 stars5/5Advanced Cybersecurity Strategies: Navigating Threats and Safeguarding Data Rating: 0 out of 5 stars0 ratingsLearn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Rating: 0 out of 5 stars0 ratingsHands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Learning zANTI2 for Android Pentesting Rating: 0 out of 5 stars0 ratings
Networking For You
Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Compete Ccna 200-301 Study Guide: Network Engineering Edition Rating: 5 out of 5 stars5/5CCNA Certification Study Guide, Volume 2: Exam 200-301 Rating: 5 out of 5 stars5/5Microsoft Azure For Dummies Rating: 0 out of 5 stars0 ratingsNetworking All-in-One For Dummies Rating: 5 out of 5 stars5/5ITIL 4: Direct, plan and improve: Reference and study guide Rating: 0 out of 5 stars0 ratingsCabling: The Complete Guide to Copper and Fiber-Optic Networking Rating: 5 out of 5 stars5/5ITIL 4: High-velocity IT: Reference and study guide Rating: 0 out of 5 stars0 ratingsITIL 4: Digital and IT strategy: Reference and study guide Rating: 5 out of 5 stars5/5AZ-104: Azure Administrator Mastery Rating: 0 out of 5 stars0 ratingsLinux Bible Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsAWS Certified Machine Learning Study Guide: Specialty (MLS-C01) Exam Rating: 0 out of 5 stars0 ratingsREMOTE ACCESS VPN- SSL VPN: A deep dive into SSL VPN from basic Rating: 5 out of 5 stars5/5Cisco Networking Essentials Rating: 0 out of 5 stars0 ratingsLinux Essentials - A Beginner's Guide To Linux Operating System Rating: 3 out of 5 stars3/5Arduino Home Automation Projects Rating: 3 out of 5 stars3/5SharePoint For Dummies Rating: 0 out of 5 stars0 ratingsNetworking For Dummies Rating: 5 out of 5 stars5/5Penetration Testing Bootcamp Rating: 5 out of 5 stars5/5Rereading Marx in the Age of Digital Capitalism Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Study Guide: Exam N10-009 Rating: 0 out of 5 stars0 ratingsMastering Modern Web Penetration Testing Rating: 0 out of 5 stars0 ratingsHome Networking Do-It-Yourself For Dummies Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Network+ Certification Passport, Sixth Edition (Exam N10-007) Rating: 1 out of 5 stars1/5Computer Networking: An introductory guide for complete beginners: Computer Networking, #1 Rating: 5 out of 5 stars5/5FreeSWITCH 1.6 Cookbook Rating: 0 out of 5 stars0 ratingsAlt-Right: From 4chan to the White House Rating: 3 out of 5 stars3/5
Reviews for Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks
0 ratings0 reviews
Book preview
Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks - Dr. Hidaia Mahmood Alassouli
1. Introduction:
Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system. During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible.
Footprinting refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. An Ethical hacker has to spend the majority of his time in profiling an organization, gathering information about the host, network and people related to the organization. Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected.
Network scanning is used to recognize available network services, discover and recognize any filtering systems in place, look at what operating systems are in use, and to protect the network from attacks. It can also be used to determine the overall health of the network.
Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a