from book:
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
by Ronald L. Krutz and Russell Dean Vines 
John Wiley & Sons © 2008
Reconnaisance
 active: just evastroping (like sniffing or monitoring)
 passive: probes networks t get OS and available services)

Scanning
 nmap
 Nessues
 nikto/wikto
 Acutenix 
 AppScan

Acquiring Access

denial of service attacks, buffer overflow attacks, and application-based attacks

Maintaining Access

Covering tracks



Posted by CEOinIRVINE
l