O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image

CHAPTER 3

Reconnaissance: Information Gathering for the Ethical Hacker

In this chapter you will learn about

• Defining footprinting

• Describing the information-gathering methodology

• Understanding the use of whois, ARIN, and nslookup

• Describing DNS record types

• Defining and describing Google hacking

• Using Google hacking

image

Have you ever read The Art of War by Sun Tzu? If you haven’t, let me warn you: It’s not something you’re liable to snuggle up on the bed with and read breathlessly, wondering how it’s going to end. It is, though, a masterpiece ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required