Chapter 4. Enumeration and System Hacking

This chapter covers the following topics:

Image Enumeration: The process of counting off or listing what services, applications, and protocols are present on each identified computer.

Image System Hacking: The process of gaining access, escalating privileges, maintaining control, and covering tracks.

This chapter introduces Windows enumeration and system hacking. It gives you the knowledge you need to prepare for the Certified Ethical Hacker exam, and it broadens your knowledge of Windows security controls and weaknesses. ...

Get Certified Ethical Hacker (CEH) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.