CEH_ Official Certified Ethical Hacker Review Guide_ Exam 312-50 - Kimberly Graves [100]
Table of Contents
Introduction
Introduction to Ethical Hacking, Ethics, and Legality 1
Understanding Ethical Hacking Terminology
Identifying Different Types of Hacking Technologies
Understanding the Different Phases Involved in Ethical Hacking and Listing the Five Stages of Ethica
Phase 1: Passive and Active Reconnaissance
Phase 4: Maintaining Access
Ethical Hackers and Crackers-Who Are They?
What Do Ethical Hackers Do?
Security, Functionality, and Ease of Use Triangle
Defining the Skills Required to Become an Ethical Hacker
Describing the Ways to Conduct Ethical Hacking
Types of Ethical Hacks
Ethical Hacking Report
Understanding 18 U.S.C. 5 1029 and 1030 U.S. Federal Law
Review Questions
Answers to Review Questions
Footprinting and Social Engineering
Footprinting
Describe the Information Gathering Methodology
Describe Competitive Intelligence
Understand DNS Enumeration
Understand Whois and ARIN Lookups
Identify Different Types of DNS Records
Understand How Traceroute Is Used in Footprinting
Understand How E-Mail Tracking Works
Social Engineering
What Are the Common Types Of Attacks?
Understand Insider Attacks
Describe Phishing Attacks
Understand URL Obfuscation
Scanning and Enumeration
Scanning
Understand the CEH Scanning Methodology
Understand Ping Sweep Techniques
Understand Nmap Command Switches
Understand SYN, Stealth, XMAS, NULL, IDLE, and FIN Scans
List TCP Communication Flag Types
Understand War-Dialing Techniques
Understand Banner Grabbing and OS Fingerprinting Techniques
Understand How Proxy Servers Are Used in Launching an Attack
Understand HTTP Tunneling Techniques
Enumeration
What Is Enumeration?
What Is SNMP Enumeration?
Windows 2000 DNS Zone Transfer
What Are the Steps Involved in Performing Enumeration?
System Hacking
Understanding Password-Cracking Techniques
Understanding the LanManager Hash