30 Enumerating2
Hiteishi Diwanji
![](http://itp4.epgpbooks.inflibnet.ac.in/wp-content/uploads/sites/25/2018/07/Untitled-179.png)
![](http://itp4.epgpbooks.inflibnet.ac.in/wp-content/uploads/sites/25/2018/07/Untitled-180.png)
![](http://itp4.epgpbooks.inflibnet.ac.in/wp-content/uploads/sites/25/2018/07/Untitled-181.png)
![](http://itp4.epgpbooks.inflibnet.ac.in/wp-content/uploads/sites/25/2018/07/Untitled-182.png)
![](http://itp4.epgpbooks.inflibnet.ac.in/wp-content/uploads/sites/25/2018/07/Untitled-183.png)
![](http://itp4.epgpbooks.inflibnet.ac.in/wp-content/uploads/sites/25/2018/07/Untitled-184.png)
![](http://itp4.epgpbooks.inflibnet.ac.in/wp-content/uploads/sites/25/2018/07/Untitled-185.png)
![](http://itp4.epgpbooks.inflibnet.ac.in/wp-content/uploads/sites/25/2018/07/Untitled-186.png)
you can view video on enumerating2 | ![]() |
Suggested Reading:
- Cryptography and Network Security Principles and Practice by William Stallings, sixth Edition, PEARSON.
- Security in Computing by Charles Pfleeger & Shari Lawrence Pfleeger, fourth Edition, PEARSON.
- Network Security by Charlie Kaufman, Radia Perlman, Mike Speciner, second Edition, PHI.
- The Complete Reference – Network Security by Roberta Bragg, Mark Rhodes-Ousley & Keith Strassberg, Tata McGraw Hill
- Network Security Bible by Eric Cole, Ronald Krutz, James Conley, Wiley
- Hacking 6 Exposed by Stuart McClure, Joel Scambray & George Kurtz , Tata McGraw Hill .
- www.snort.org
- https://nmap.org