PDF Google Drive Downloader v1.1


Report a problem

Content text CEH Official Certified Ethical Hacker Review Guide.pdf


Official Certified Ethical Hacker Review Guide Steven DeFino Intense School, Senior Security Instructor and Consultant Contributing Authors Barry Kaufman, Director of Intense School Nick Valenteen, Intense School, Senior Security Instructor Larry Greenblatt, Intense School, Senior Security Instructor Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States
Official Certified Ethical Hacker Review Guide Steven DeFino Barry Kaufman Nick Valenteen Larry Greenblatt Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Senior Product Manager: Michelle Ruelos Cannistraci Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Content Project Manager: Jessica McNavich Art Director: Jack Pendleton Cover photo or illustration: Digital Vision Manufacturing Coordinator: Denise Powers Copyeditor: S4Carlisle Publishing Services Proofreader: S4Carlisle Publishing Services Compositor: S4Carlisle Publishing Services © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, submit all requests online at www.cengage.com/permissions Further permissions questions can be e-mailed to [email protected] Library of Congress Control Number: 2009938744 ISBN-13: 978-1-435-48853-3 ISBN-10: 1-435-48853-9 Course Technology 20 Channel Center Street Boston, MA 02210 USA Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at: international .cengage.com/region Cengage Learning products are represented in Canada by Nelson Education, Ltd. For your lifelong learning solutions, visit course.cengage.com Visit our corporate website at cengage.com Some of the product names and company names used in this book have been used for identification purposes only and may be trademarks or registered trade- marks of their respective manufacturers and sellers. Microsoft and the Office logo are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Course Technology, a part of Cengage Learning, is an independent entity from the Microsoft Corporation, and not affiliated with Microsoft in any manner. Any fictional data related to persons or companies or URLs used throughout this book is intended for instructional purposes only. At the time this book was printed, any such data was fictional and not belonging to any real persons or companies. Course Technology and the Course Technology logo are registered trademarks used under license. Course Technology, a part of Cengage Learning, reserves the right to revise this publication and make changes from time to time in its content without notice. The programs in this book are for instructional purposes only. They have been tested with care, but are not guaranteed for any particular intent beyond educa- tional purposes. The author and the publisher do not offer any warranties or representations, nor do they accept any liabilities with respect to the programs. Printed in the United States of America 1 2 3 4 5 6 7 12 11 10 09
INTRODUCTION vii CHAPTER ONE Ethical Hacking 1 Know the Definition of Ethical Hacking 2 Know the Concepts of Threat Modeling 3 Know the Five Phases of an Attack 5 Know the Concepts of Vulnerability Research and Testing 7 CHAPTER TWO Hacking Laws 11 Know the Legal Issues of Ethical Hacking 12 Know the Challenges of Legal Enforcement 12 Know the Ins and Outs of Protecting Intellectual Property 13 Know the Important Legal Statutes 16 CHAPTER THREE Footprinting 21 Know the Information Gathering Methodology 22 Know Several Different Passive Information Gathering Techniques 25 Know How to Use DNS and the Regional Internet Registrars 27 CHAPTER FOUR Google Hacking 33 Know What the Google Toolset Offers 34 Know What You Are Looking for 38 Know About Some of the Other Google Tools 40 CHAPTER FIVE Scanning 45 Know the Scanning Methodology 46 Know How ICMP Works 52 Know the TCP Handshake 52 Know the Types of Scans 54 Know about Scanning Tools 57 CHAPTER SIX Enumeration 61 Know the Value of the Enumeration Step 62 Know How to Create a NULL Session 62 Know the File Sharing Ports 63 Know What the “RestrictAnonymous” Key Is 65 Know How to Recognize Windows SIDs 66 Know How to Use the Netstat and NBTstat Tools 66 Know How to Enumerate a Linux Host 67 Know How to Use SNMP for Enumeration 70 Know How to Use LDAP for Enumeration 71 CHAPTER SEVEN System Hacking 73 Know Password Cracking Techniques 74 Know Eavesdropping and Privilege Escalation 81 Know the Techniques of Steganography 85 CHAPTER EIGHT Trojans and Backdoors 91 Know What Trojan Applications Can Do 92 Know the Infection Vectors 94 Know How to Build a Server 100 Know How to Detect an Infection 103 Contents

Related document

x
Report download errors
Report content



Download file quality is faulty:
Full name:
Email:
Comment
If you encounter an error, problem, .. or have any questions during the download process, please leave a comment below. Thank you.