This chapter is from the book
Key Terms
- Active fingerprinting
- CNAMES
- Covert channel
- Demilitarized zone (DMZ)
- DoS
- Echo reply
- Echo request
- EDGAR database
- Google dorks
- Google hacking
- Initial Sequence Number
- Internet Assigned Numbers Authority (IANA)
- Information matrix
- Intrusion detection system
- Nslookup
- Open source
- Ping sweep
- Passive fingerprinting
- Port knocking
- Port scanning
- Scope creep
- Script kiddie
- Simple Network Monitoring Protocol (SNMP)
- Social engineering
- Synchronize sequence number
- Time-to-live (TTL)
- Traceroute
- Wardialing
- Wardriving
- Whois
- Written authorization
- Zone transfer