<div> This book is a complete guide to prepare for the CEH Certified Ethical Hacker certification exam. </div> <div> <br></div> <div> <br></div> <div> Leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 11
CEH Certified Ethical Hacker Study Guide
β Scribed by Graves, Kimberly
- Publisher
- John Wiley [distributor], Wiley
- Year
- 2010
- Tongue
- English
- Leaves
- 439
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Prepare for the new version of CEH certification with this advanced guide Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study tools This is the ideal guide to prepare you for the new CEH certification exam. Reviews
β¦ Table of Contents
CEH: Certified Ethical Hacker Study Guide......Page 9
Acknowledgments......Page 13
About the Author......Page 14
Contents at a Glance......Page 15
Contents......Page 17
Table of Exercises......Page 25
Introduction......Page 27
Assessment Test......Page 36
Answers to Assessment Test......Page 42
Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality......Page 45
Defining Ethical Hacking......Page 46
How to Be Ethical......Page 60
Keeping It Legal......Page 62
Exam Essentials......Page 67
Review Questions......Page 69
Answers to Review Questions......Page 73
Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering......Page 75
Reconnaissance......Page 77
Information-Gathering Methodology......Page 81
Social Engineering......Page 92
Summary......Page 98
Exam Essentials......Page 99
Review Questions......Page 100
Answers to Review Questions......Page 104
Chapter 3: Gathering Network and Host Information: Scanning and Enumeration......Page 107
Scanning......Page 108
Enumeration......Page 125
Summary......Page 130
Exam Essentials......Page 131
Review Questions......Page 133
Answers to Review Questions......Page 137
Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files......Page 139
Types of Passwords......Page 140
Cracking a Password......Page 146
Understanding Keyloggers and Other Spyware Technologies......Page 153
Escalating Privileges......Page 154
Understanding Rootkits......Page 156
Hiding Files......Page 157
Understanding Steganography Technologies......Page 159
Covering Your Tracks and Erasing Evidence......Page 160
Summary......Page 161
Exam Essentials......Page 162
Review Questions......Page 163
Answers to Review Questions......Page 167
Chapter 5: Trojans, Backdoors, Viruses, and Worms......Page 169
Trojans and Backdoors......Page 170
Viruses and Worms......Page 185
Exam Essentials......Page 190
Review Questions......Page 191
Answers to Review Questions......Page 195
Chapter 6: Gathering Data from Networks: Sniffers......Page 197
Understanding Host-to-Host Communication......Page 198
Sniffing Countermeasures......Page 202
Bypassing the Limitations of Switches......Page 203
Wireshark Filters......Page 205
Understanding MAC Flooding and DNS Spoofing......Page 208
Summary......Page 210
Exam Essentials......Page 211
Review Questions......Page 212
Answers to Review Questions......Page 215
Chapter 7: Denial of Service and Session Hijacking......Page 217
Denial of Service......Page 218
Session Hijacking......Page 227
Summary......Page 231
Exam Essentials......Page 232
Review Questions......Page 233
Answers to Review Questions......Page 237
Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques......Page 239
How Web Servers Work......Page 241
Types of Web Server Vulnerabilities......Page 242
Web Application Vulnerabilities......Page 253
Web-Based Password-Cracking Techniques......Page 256
Exam Essentials......Page 259
Review Questions......Page 260
Answers to Review Questions......Page 263
Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows......Page 265
SQL Injection......Page 266
Buffer Overflows......Page 273
Exam Essentials......Page 276
Review Questions......Page 277
Answers to Review Questions......Page 281
Chapter 10: Wireless Network Hacking......Page 283
Wi-Fi and Ethernet......Page 284
Authentication and Cracking Techniques......Page 286
Using Wireless Sniffers to Locate SSIDs......Page 290
MAC Filters and MAC Spoofing......Page 292
Rogue Access Points......Page 294
Securing Wireless Networks......Page 295
Exam Essentials......Page 298
Review Questions......Page 299
Answers to Review Questions......Page 303
Chapter 11: Physical Site Security......Page 305
Components of Physical Security......Page 306
Understanding Physical Security......Page 308
Physical Site Security Countermeasures......Page 310
Exam Essentials......Page 318
Review Questions......Page 319
Answers to Review Questions......Page 323
Chapter 12: Hacking Linux Systems......Page 325
Linux Basics......Page 326
Compiling a Linux Kernel......Page 329
GCC Compilation Commands......Page 332
Linux Hardening Methods......Page 333
Summary......Page 337
Exam Essentials......Page 338
Review Questions......Page 339
Answers to Review Questions......Page 343
Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls......Page 345
Types of IDSs and Evasion Techniques......Page 346
Firewall Types and Honeypot Evasion Techniques......Page 352
Exam Essentials......Page 360
Review Questions......Page 361
Answers to Review Questions......Page 366
Chapter 14: Cryptography......Page 367
Cryptography and Encryption Techniques......Page 368
Generating Public and Private Keys......Page 373
Cryptography Algorithms......Page 379
Summary......Page 381
Exam Essentials......Page 382
Review Questions......Page 383
Answers to Review Questions......Page 386
Chapter 15: Performing a Penetration Test......Page 387
Defining Security Assessments......Page 388
Penetration Testing......Page 389
Pen Test Deliverables......Page 394
Exam Essentials......Page 396
Review Questions......Page 397
Answers to Review Questions......Page 401
Appendix: About the Companion CD......Page 403
Glossary......Page 407
Index......Page 419
β¦ Subjects
Computers;Hackers;Science;Technology;Computer Science;Programming
π SIMILAR VOLUMES
βThis book is a complete guide to prepare for the CEH Certified Ethical Hacker certification exam. Leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 11 exam and advance your career in IT security. The
Full coverage of all exam objectives for the CEH exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review quest
<p><span>In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michaelβs concise, focused approach explains every exam objective from a real-w