Online Book Reader

Home Category

CEH_ Official Certified Ethical Hacker Review Guide_ Exam 312-50 - Kimberly Graves [0]

By Root 349 0
Official

Certified Ethical Hacker

Review Guide

Official

Certified Ethical Hacker

Review Guide

Kimberly Graves

Contents at a Glance

Introduction xv

Chapter 1 Introduction to Ethical Hacking, Ethics, and Legality 1

Chapter 2 Footprinting and Social Engineering 19

Chapter 3 Scanning and Enumeration 41

Chapter 4 System Hacking 67

Chapter 5 Trojans, Backdoors, Viruses, and Worms 91

Chapter 6 Sniffers 107

Chapter 7 Denial of Service and Session Hijacking 119

Chapter 8 Hacking Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques 137

Chapter 9 SQL Injection and Buffer Overflows 151

Chapter 10 Wireless Hacking 159

Chapter 11 Physical Security 169

Chapter 12 Linux Hacking 177

Chapter 13 Evading IDSs, Honeypots, and Firewalls 187

Chapter 14 Cryptography 195

Chapter 15 Penetration Testing Methodologies 203

Glossary 213

Index 225

Contents

Introduction xv

Chapter 1 Introduction to Ethical Hacking, Ethics, and Legality 1

Understanding Ethical Hacking Terminology 2

Identifying Different Types of Hacking Technologies 3

Understanding the Different Phases Involved in Ethical Hacking and Listing the Five Stages of Ethical Hacking 4

Phase 1: Passive and Active Reconnaissance 5

Phase 2: Scanning 5

Phase 3: Gaining Access 5

Phase 4: Maintaining Access 6

Phase 5: Covering Tracks 6

What Is Hacktivism? 6

Listing Different Types of Hacker Classes 6

Ethical Hackers and Crackers-Who Are They? 7

What Do Ethical Hackers Do? 8

Goals Attackers Try to Achieve 8

Security, Functionality, and Ease of Use Triangle 9

Defining the Skills Required to Become an Ethical Hacker 10

What Is Vulnerability Research? 10

Describing the Ways to Conduct Ethical Hacking 11

Creating a Security Evaluation Plan 11

Types of Ethical Hacks 12

Testing Types 12

Ethical Hacking Report 13

Understanding the Legal Implications of Hacking 13

Understanding 18 U.S.C. 5 1029 and 1030 U.S. Federal Law 14

Exam Essentials 14

Review Questions 16

Answers to Review Questions 18

Chapter 2 Footprinting and Social Engineering 19

Footprinting 20

Define the Term Footprinting 20

Describe the Information Gathering Methodology 21

Describe Competitive Intelligence 22

Understand DNS Enumeration 23

Understand Whois and ARIN Lookups 24

Identify Different Types of DNS Records 27

Understand How Traceroute Is Used in Footprinting 28

Understand How E-Mail Tracking Works 29

Understand How Web Spiders Work 29

Exam Essentials 29

Social Engineering 30

What Is Social Engineering? 30

What Are the Common Types Of Attacks? 32

Understand Insider Attacks 33

Understand Identity Theft 33

Describe Phishing Attacks 34

Understand Online Scams 34

Understand URL Obfuscation 35

Social-Engineering Countermeasures 35

Exam Essentials 36

Review Questions 37

Answers to Review Questions 40

Chapter 3 Scanning and Enumeration 41

Scanning 42

Define the Terms Port Scanning, Network Scanning, and Vulnerability Scanning 42

Understand the CEH Scanning Methodology 43

Understand Ping Sweep Techniques 44

Understand Nmap Command Switches 46

Understand SYN, Stealth, XMAS, NULL, IDLE, and FIN Scans 48

List TCP Communication Flag Types 49

Understand War-Dialing Techniques 51

Understand Banner Grabbing and OS Fingerprinting Techniques 52

Understand How Proxy Servers Are Used in Launching an Attack 53

How Do Anonymizers Work? 53

Understand HTTP Tunneling Techniques 54

Understand IP Spoofing Techniques 54

Exam Essentials 55

Enumeration 55

What Is Enumeration? 56

What Is Meant by Null Sessions? 56

What Is SNMP Enumeration? 58

Windows 2000 DNS Zone Transfer 59

What Are the Steps Involved in Performing Enumeration? 60

Exam Essentials 60

Review Questions 62

Answers to Review Questions 66

Chapter 4 System Hacking 67

Understanding Password-Cracking Techniques 68

Understanding the LanManager Hash 69

Cracking Windows 2000 Passwords 70

Redirecting the SMB Logon to the Attacker 70

SMB Redirection 71

SMB Relay MITM Attacks and Countermeasures 71

NetBIOS DoS Attacks 72

Password-Cracking Countermeasures

Return Main Page Next Page

®Online Book Reader