📡 CEH Module 3: Scanning & Enumeration – Uncovering Open Doors in Networks
📡 CEH Module 3: Scanning & Enumeration – Uncovering Open Doors in Networks Welcome to Module 3 of the Certified Ethical Hacking (CEH) course — Scanning and Enumeration . After gathering information in the Footprinting phase , it’s time to take it a step further: we now interact with the target system to find live hosts , open ports , and running services . Let’s explore how hackers and security professionals detect what’s vulnerable before launching a real attack. 🔍 What is Scanning? Scanning involves using tools to actively probe the target system or network for open ports, services, and systems. Three types of scanning: Port Scanning – Detect open ports. Network Scanning – Identify active devices and IPs. Vulnerability Scanning – Find security loopholes or misconfigurations. view 🧩 What is Enumeration? Enumeration digs deeper. After identifying live systems, it retrieves specific data like: Usernames Network shares System details Ac...