Review All Key Topics
Review the most important topics in this chapter, noted with the Key Topic icon in the outer margin of the page. Table 3-9 lists a reference of these key topics and the page numbers on which each is found.
Table 3-9 Key Topics for Chapter 3
Key Topic Element |
Description |
Page Number |
---|---|---|
Footprinting and Scanning Steps |
93 |
|
Section |
Footprinting Methodology |
93 |
Paragraph/list |
Advanced Google hacking |
98 |
Paragraph |
Using Shodan to find vulnerable systems |
100 |
Section |
Footprinting Through Social Networking Sites |
101 |
Section |
Network Footprinting |
118 |
Section |
Footprinting Countermeasures |
122 |
Section |
Host Discovery |
123 |
Section |
Port and Service Discovery |
124 |
Table 3-7 |
TCP Flag Types |
126 |
Section |
OS Discovery (Banner Grabbing/OS Fingerprinting) and Scanning Beyond IDS and Firewall |
141 |
Section |
Finding Open Services |
145 |
A Network Diagram of Discovered Devices and Applications |
149 |