CEH_ Official Certified Ethical Hacker Review Guide_ Exam 312-50 - Kimberly Graves [0]
Certified Ethical Hacker
Review Guide
Official
Certified Ethical Hacker
Review Guide
Kimberly Graves
Contents at a Glance
Introduction xv
Chapter 1 Introduction to Ethical Hacking, Ethics, and Legality 1
Chapter 2 Footprinting and Social Engineering 19
Chapter 3 Scanning and Enumeration 41
Chapter 4 System Hacking 67
Chapter 5 Trojans, Backdoors, Viruses, and Worms 91
Chapter 6 Sniffers 107
Chapter 7 Denial of Service and Session Hijacking 119
Chapter 8 Hacking Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques 137
Chapter 9 SQL Injection and Buffer Overflows 151
Chapter 10 Wireless Hacking 159
Chapter 11 Physical Security 169
Chapter 12 Linux Hacking 177
Chapter 13 Evading IDSs, Honeypots, and Firewalls 187
Chapter 14 Cryptography 195
Chapter 15 Penetration Testing Methodologies 203
Glossary 213
Index 225
Contents
Introduction xv
Chapter 1 Introduction to Ethical Hacking, Ethics, and Legality 1
Understanding Ethical Hacking Terminology 2
Identifying Different Types of Hacking Technologies 3
Understanding the Different Phases Involved in Ethical Hacking and Listing the Five Stages of Ethical Hacking 4
Phase 1: Passive and Active Reconnaissance 5
Phase 2: Scanning 5
Phase 3: Gaining Access 5
Phase 4: Maintaining Access 6
Phase 5: Covering Tracks 6
What Is Hacktivism? 6
Listing Different Types of Hacker Classes 6
Ethical Hackers and Crackers-Who Are They? 7
What Do Ethical Hackers Do? 8
Goals Attackers Try to Achieve 8
Security, Functionality, and Ease of Use Triangle 9
Defining the Skills Required to Become an Ethical Hacker 10
What Is Vulnerability Research? 10
Describing the Ways to Conduct Ethical Hacking 11
Creating a Security Evaluation Plan 11
Types of Ethical Hacks 12
Testing Types 12
Ethical Hacking Report 13
Understanding the Legal Implications of Hacking 13
Understanding 18 U.S.C. 5 1029 and 1030 U.S. Federal Law 14
Exam Essentials 14
Review Questions 16
Answers to Review Questions 18
Chapter 2 Footprinting and Social Engineering 19
Footprinting 20
Define the Term Footprinting 20
Describe the Information Gathering Methodology 21
Describe Competitive Intelligence 22
Understand DNS Enumeration 23
Understand Whois and ARIN Lookups 24
Identify Different Types of DNS Records 27
Understand How Traceroute Is Used in Footprinting 28
Understand How E-Mail Tracking Works 29
Understand How Web Spiders Work 29
Exam Essentials 29
Social Engineering 30
What Is Social Engineering? 30
What Are the Common Types Of Attacks? 32
Understand Insider Attacks 33
Understand Identity Theft 33
Describe Phishing Attacks 34
Understand Online Scams 34
Understand URL Obfuscation 35
Social-Engineering Countermeasures 35
Exam Essentials 36
Review Questions 37
Answers to Review Questions 40
Chapter 3 Scanning and Enumeration 41
Scanning 42
Define the Terms Port Scanning, Network Scanning, and Vulnerability Scanning 42
Understand the CEH Scanning Methodology 43
Understand Ping Sweep Techniques 44
Understand Nmap Command Switches 46
Understand SYN, Stealth, XMAS, NULL, IDLE, and FIN Scans 48
List TCP Communication Flag Types 49
Understand War-Dialing Techniques 51
Understand Banner Grabbing and OS Fingerprinting Techniques 52
Understand How Proxy Servers Are Used in Launching an Attack 53
How Do Anonymizers Work? 53
Understand HTTP Tunneling Techniques 54
Understand IP Spoofing Techniques 54
Exam Essentials 55
Enumeration 55
What Is Enumeration? 56
What Is Meant by Null Sessions? 56
What Is SNMP Enumeration? 58
Windows 2000 DNS Zone Transfer 59
What Are the Steps Involved in Performing Enumeration? 60
Exam Essentials 60
Review Questions 62
Answers to Review Questions 66
Chapter 4 System Hacking 67
Understanding Password-Cracking Techniques 68
Understanding the LanManager Hash 69
Cracking Windows 2000 Passwords 70
Redirecting the SMB Logon to the Attacker 70
SMB Redirection 71
SMB Relay MITM Attacks and Countermeasures 71
NetBIOS DoS Attacks 72
Password-Cracking Countermeasures