<b><i>CEH v11 Certified Ethical Hacker Exam Cram</i></b> is the perfect study guide to help you score higher on the updated EC-Council CEH v11 exam. Using the proven Exam Cram method of study, it offers comprehensive foundational learning for all facets of ethical hacking and penetration testing. <p
Certified Ethical Hacker (CEH) Exam Cram
β Scribed by William Chuck Easttom
- Publisher
- Pearson IT Certification
- Year
- 2022
- Tongue
- English
- Leaves
- 447
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
βCEH v11 Certified Ethical Hacker Exam Cram is the perfect study guide to help you score higher on the updated EC-Council CEH v11 exam. Using the proven Exam Cram method of study, it offers comprehensive foundational learning for all facets of ethical hacking and penetration testing.
Chuck Easttom's expert real-world approach reflects both his expertise as one of the leading cybersecurity practitioners and instructors in the world, as well as test-taking insights he has gained from teaching CEH preparation courses worldwide, including courses taught directly for EC-Council. Easttom assumes no prior knowledge: readers will little or no experience in ethical hacking and penetration testing can obtain the knowledge they need to take and pass the exam. He thoroughly covers every CEH v11 topic, including:
Reconnaissance and scanning Enumeration and vulnerability scanning System and session hacking Malware, sniffing, social engineering, and DOS attacks Evading security measures Hacking web servers, applications, wireless, mobile, IoT, and OT Cloud computing, cryptography, and more
Extensive preparation tools include topic overviews, exam alerts, CramSavers, CramQuizzes, chapter-ending review questions, author notes and tips, and an extensive glossary. The handy Cram Sheet tear-out brings together tips, acronyms, and memory joggers not available anywhere else -- perfect for last-minute study.
Powerful Pearson Test Prep practice test software offers an extensive collection of exam-realistic practice questions, with many customization and reporting features: test yourself in study mode, practice exam mode, or flash card mode. The companion website also provides access to several digital assets including the Glossary and Cram Sheet.β
β¦ Table of Contents
Cover
Title
Copyright
Credits
Contents at a Glance
Table of Contents
Introduction
CHAPTER 1: Reconnaissance and Scanning
Reconnaissance Types
Passive Reconnaissance Techniques
Active Reconnaissance Techniques
SSDP Scan
Nmap
hping
Banner Grabbing
TTL and TCP Scanning
Evading IDS/Firewall
What Next?
CHAPTER 2: Enumeration and Vulnerability Scanning
Scanning
TCP Scanning
ICMP Scanning
Scanning Process
Network Mapping
Network Packet Capture
tcpdump
tcpdump -i eth0
tcpdump -c 500 -i eth0
tcpdump -D
Wireshark
Vulnerability Scanning
Scoring Vulnerabilities
Nessus
Nexpose
SAINT
Additional Vulnerability Assessment Tools
What Next?
CHAPTER 3: System Hacking
CEH Methodology
Password Cracking
pwdump
RainbowCrack
Other Password Cracking Tools
Pass the Hash
LLMNR/NBT-NS Poisoning
DLL Hijacking and Injection
Alternate Data Streams
macOS Attacks
Malware
Rootkits
Spyware
Steganography
Covering Tracks
Metasploit
Session Hijacking
What Next?
CHAPTER 4: Malware
Malware Types
Trojan Horses
Backdoor
Spyware
Ransomware
Rootkits
Fileless Malware
Botnet
Advanced Persistent Threats
Exploit Kits
How Malware Spreads
Malware Components
Malware Evasion Techniques
Viruses
Types of Viruses
Creating a Virus
Logic Bombs
Protecting Against Malware
Indicators of Malware
Sheep Dipping
Backups
Malware Analysis
Antivirus
What Next?
CHAPTER 5: Packet Sniffing and Social Engineering
Social Engineering
Human-Based Social Engineering
Computer-Based Social Engineering
Mobile-Based Social Engineering
Insider Threats
More on Social Engineering
Social Engineering Countermeasures
Packet Sniffing
Passive Versus Active Sniffing
Hardware Protocol Analyzers
Network Information
Active Attack Techniques
Protocol Scanning
What Next?
CHAPTER 6: Denial of Service and Session Hijacking
Denial of Service
Protocol Attacks
Application Layer Attacks
Volumetric Attacks
Other DoS Attacks
Common Tools Used for DoS Attacks
Countermeasures to DoS and DDoS Attacks
DoS in the Real World
Session Hijacking
The Session Hijacking Process
Specific Session Hijacking Methods
Countermeasures for Session Hijacking
What Next?
CHAPTER 7: Evading Security Measures
Intrusion Detection Systems
Types of IDSs
Intrusions
Firewalls and Honeypots
Packet Filtering
Stateful Packet Inspection Firewalls
Application Gateways
Next-Generation Firewalls (NGFWs)
Honeypots
Virtual Private Networks
IDS Evasion Techniques
Obfuscation
Insertion Attacks
Denial of Service (DoS) Attacks
Session Splicing
Fragment Attacks
Time to Live Attacks
Invalid RST Packet Attacks
Urgency Flag
Polymorphism
Desynchronization
Evasion Countermeasures
Firewall Evasion Techniques
Firewall Identification
Obfuscation
Source Routing
Tunneling
WAF Bypass
Firewall Evasion Tools
Firewall Evasion Countermeasures
What Next?
CHAPTER 8: Hacking Web Servers and Web Applications
Web Servers
Web Server Architecture
Web Server Issues
Attacks on Web Servers
Web Shells
Securing the Web Server
Web Applications
SQL Script Injection
XSS
Remote File Inclusion
CSRF
Forceful Browsing
Parameter Tampering
Cookie Poisoning
LDAP Injection
Command Injection
Web API
Webhook
OWASP Top 10
Web Footprinting
Metasploit
What Next?
CHAPTER 9: Hacking Wireless
Wireless Technology
Wireless Terminology
IEEE 802.11 Standard
Wi-Fi Security
Bluetooth
Zigbee
Hacking Wireless
General Attacks
Wi-Fi Discovery and Scanning
Rogue Access Attacks
MAC Spoofing
Key Reinstallation (KRACK) Attacks
Jamming Attacks
Geo Mapping Wi-Fi
Aircrack-ng
Wireless ARP Poisoning
Wireless Security
Bluetooth Attacks
Creating a Wireless Hot Spot
What Next?
CHAPTER 10: Hacking Mobile
Mobile Technologies
Cellular Networks
Cell System Components
Mobile Operating Systems
Mobile Threats
Mobile Attack Vectors
SSL Stripping
Mobile Spam
Open Access Points
Vulnerable Sandboxing
Smishing
Malicious Apps
Attack Software
Pen Testing Methodology
What Next?
CHAPTER 11: IOT and OT Hacking
IoT Fundamentals
V2X
Protocols
MQTT
Wired
NFC
Operating Systems
IoT Architectures
SCADA/ICS
Operational Technology (OT)
Healthcare IoT
IoT Platforms
IOT Security and Hacking
IoT Security Layers
HVAC Exploitation
BlueBorne Attack
Mirai
Sybil Attacks
Black Hole Attacks
Rushing Attacks
Rolling Code Attacks
Jamming Attacks
Hello Flood
Mozi Botnet
Attify Zigbee
OWASP TOP 10
Ethical Hacking Process
Scanning
Attacking
What Next?
CHAPTER 12: Cloud Computing and Hacking
Cloud Fundamentals
Basic Cloud Concepts
Cloud Security Issues
Serverless Computing
Containers
Cloud Computing Attacks
General Threats
Service Hijacking
Cross-Site Scripting
SOAP Attacks
Man-in-the-Cloud Attacks
DNS Attacks
Side-Channel Attacks
Authentication Attacks
Specific Vulnerabilities
Cloud Penetration Testing
What Next?
CHAPTER 13: Cryptography
Cryptography Concepts
Symmetric Ciphers
Asymmetric Ciphers
Hashes
Cryptographic Tools
PKI
Digital Certificates
Digital Signatures
SSL/TLS
Cryptographic Attacks
Cryptanalysis
Rainbow Tables
The Birthday Paradox
DUHK
Poodle
DROWN
CRIME
What Next?
Glossary
A
B
C
D
E
F
G
H
I
J-K
L
M
N
O
P
Q
R
S
T
U
V
W-Z
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q-R
S
T
U
V
W
X
Y-Z
π SIMILAR VOLUMES
<h4>Donβt Let the Real Test Be Your First Test!</h4> <p>Written by an IT security and education expert, <i>CEH Certified Ethical Hacker Practice Exams</i> is filled with more than 500 realistic practice exam questions based on the latest release of the Certified Ethical Hacker exam. To aid in your u
Donβt Let the Real Test Be Your First Test! Fully updated for the CEH v11 exam objectives, this practical guide contains more than 550 realistic practice exam questions to prepare you for the EC-Councilβs Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explan
<P><STRONG>Donβt Let the Real Test Be Your First Test!</STRONG></P><P>Fully updated for the CEH v9 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Councilβs Certified Ethical Hacker exam. To aid in your understanding of the mat
Fully up-to-date coverage of every topic on the CEH v9 certification exam Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the to
Self-study CEH Certified Ethical Hacker Exam prep guide: complete coverage of all CEH subjects & exam topics; test tricks & tips; & 40 highly realistic sample questions & exercises, to strengthen understanding & prepare for first-try exam success.