![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcw-JX6f5tA1RDbH5_5S_wLKVWZoNOTTPt-MCK0cCubRFSw6sTTgWtG79L4ui6t3iS2jvBRufEj7KHYAyBgtY-XvI9xmVRb-PMh5rn0jhloKqDlTGPoHGk4XWeCpeCQmoN1YmKQ4UmWXtu/s320/CEH+1.jpg)
The first book in the Ethical Hacking and Countermeasures Series is Attack Phases. It provides an introduction to ethical hacking and discusses footprinting, scanning, enumeration, systems hacking, and penetration testing.
Chapter 1, Introduction to Ethical Hacking, discusses the importance of information security in today’s world and explains the concept of ethical hacking. Other coverage includes vulnerability research, different types of hacking; describes computer crimes and implications.
Chapter 2, Footprinting, defines footprinting in terms of the reconnaissance phase, describes both passive and competitive intelligence gathering, explains how to trace an
Internet connection, and how to track personal e-mail.
Chapter 3, Scanning, describes the different types of scanning and scanning methodology. Various scanning tools are also introduced.
Chapter 4, Enumeration, describes enumeration and the different techniques used for enumeration.
Chapter 5, Systems Hacking, describes how to crack passwords, identifies various password cracking tools; how to execute applications remotely, and provides an understanding of rootkits, steganography, and how to cover tracks.
Chapter 6, Penetration Testing, discusses how penetration testing is performed, defines security assessments, and describes how to perform risk management; automated testing and manual testing as well as describing various penetration-testing software tools.