<div> This book is a complete guide to prepare for the CEH Certified Ethical Hacker certification exam. </div> <div> <br></div> <div> <br></div> <div> Leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 11
Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking
β Scribed by Mohd Sohaib
- Publisher
- BPB Publications
- Year
- 2022
- Tongue
- English
- Leaves
- 786
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more. KEY FEATURES β Courseware and practice papers with solutions for C.E.H. v11. β Includes hacking tools, social engineering techniques, and live exercises. β Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing. DESCRIPTION The 'Certified Ethical Hacker's Guide' summarises all the ethical hacking and penetration testing fundamentals you'll need to get started professionally in the digital security landscape. The readers will be able to approach the objectives globally, and the knowledge will enable them to analyze and structure the hacks and their findings in a better way. The book begins by making you ready for the journey of a seasonal, ethical hacker. You will get introduced to very specific topics such as reconnaissance, social engineering, network intrusion, mobile and cloud hacking, and so on. Throughout the book, you will find many practical scenarios and get hands-on experience using tools such as Nmap, BurpSuite, OWASP ZAP, etc. Methodologies like brute-forcing, wardriving, evil twining, etc. are explored in detail. You will also gain a stronghold on theoretical concepts such as hashing, network protocols, architecture, and data encryption in real-world environments. In the end, the evergreen bug bounty programs and traditional career paths for safety professionals will be discussed. The reader will also have practical tasks and self-assessment exercises to plan further paths of learning and certification. WHAT YOU WILL LEARN β Learn methodologies, tools, and techniques of penetration testing and ethical hacking. β Expert-led practical demonstration of tools and tricks like nmap, BurpSuite, and OWASP ZAP. β Learn how to perform brute forcing, wardriving, and evil twinning. β Learn to gain and maintain access to remote systems. β Prepare detailed tests and execution plans for VAPT (vulnerability assessment and penetration testing) scenarios. WHO THIS BOOK IS FOR This book is intended for prospective and seasonal cybersecurity lovers who want to master cybersecurity and ethical hacking. It also assists software engineers, quality analysts, and penetration testing companies who want to keep up with changing cyber risks. TABLE OF CONTENTS 1. Cyber Security, Ethical Hacking, and Penetration Testing 2. CEH v11 Prerequisites and Syllabus 3. Self-Assessment 4. Reconnaissance 5. Social Engineering 6. Scanning Networks 7. Enumeration 8. Vulnerability Assessment 9. System Hacking 10. Session Hijacking 11. Web Server Hacking 12. Web Application Hacking 13. Hacking Wireless Networks 14. Hacking Mobile Platforms 15. Hacking Clout, IoT, and OT Platforms 16. Cryptography 17. Evading Security Measures 18. Practical Exercises on Penetration Testing and Malware Attacks 19. Roadmap for a Security Professional 20. Digital Compliances and Cyber Laws 21. Self-Assessment-1 22. Self-Assessment-2
β¦ Table of Contents
Table of Contents
- Cyber Security, Ethical Hacking, and Penetration Testing
Introduction
Structure
Objectives
The Ten Thousand Feet View
Cyber Security
Free comic strip subscription service
Electronic health record service
Ethical Hacking
Phases of a Hack
Penetration testing
Conclusion
- CEH v11 Prerequisites and Syllabus
Introduction
Structure
Objectives
Certified Ethical Hacker
Version 10 & 11
Prerequisites
Modes of study and examination
Option 1: ECC Exam voucher
Option 2: VUE Exam voucher
Conclusion
- Self-Assessment
Introduction
Structure
Objectives
SECTION 'A'
Information Security and Penetration Testing
SECTION 'B'
EC-Council CEH
Answers
Conclusion
- Reconnaissance
Introduction
Structure
Objectives
Understanding Reconnaissance
Financial Information
Technology Stack
Workforce and Clientele
Operating Environment
Network Configurations
Web content
Conclusion
Test Your Understanding
Answers
- Social Engineering
Introduction
Structure
Objectives
Social Engineering: The Bookie Story
Social Engineering Methodology
Social Engineering Techniques
Tools of Social Engineering
Social Engineering Countermeasures
Conclusion
Test Your Understanding
Answers
- Scanning Networks
Introduction
Structure
Objectives
Anatomy of a Computer Network
Live Host Discovery
Port Scan and Service Discovery
TCP Scan
UDP Scan
Banner Grabbing
Network Mapping
Conclusion
Test Your Understanding
Answers
- Enumeration
Introduction
Structure
Objectives
Enumeration as a successor to network scan
NetBIOS enumeration
SNMP Enumeration
LDAP enumeration
NTP enumeration
NTP enumeration commands
SMTP enumeration
DNS enumeration
Conclusion
Test Your Understanding
Answers
- Vulnerability Assessment
Introduction
Structure
Objectives
Process Overview
Residual Risk
DevSecOps
Conclusion
Test Your Understanding
Answers
- System Hacking
Introduction
Structure
Objectives
System hacking stages
Password cracking
Password storage in modern systems
Security Account Manager (SAM)
NTLM Authentication
Kerberos authentication
Rainbow tables
Backdoor Entry β Trojans
Password cracking defense checklist
Privilege escalation
Horizontal privilege escalation
Vertical privilege escalation
DLL hijacking
Executing application
Remote execution tools
Hiding files and covering tracks
Conclusion
Test Your Understanding
Answers
- Session Hijacking
Introduction
Structure
Objectives
TCP and Web sessions
Network-level session hijacking
TCP session hijacking
UDP hijacking
Application-level session hijacking
Countermeasures to session hijacking
Conclusion
Test Your Understanding
Answers
- Web Server Hacking
Introduction
Structure
Objectives
Web server
Tools for web server hacking
Conclusion
Test Your Understanding
Answers
- Web Application Hacking
Introduction
Structure
Objectives
Tools used in web application hacking
Conclusion
Test Your Understanding
Answers
- Hacking Wireless Networks
Introduction
Structure
Objectives
The wireless connectivity
Wireless standards
802.11a
802.11b
802.11g
IEEE 802.11ac (Wi-Fi)
802.16 (WiMAX)
Bluetooth
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)
WPA2
WPA3
Wireless Hacking Methodology
Wireless network discovery
Wireless network mapping
Wireless network analysis
Wireless network attacks
Deauthentication attack
WPA Handshake Capture
Man-in-the-Middle Attack (MITM)
Wireless Honeypots
Conclusion
Test Your Understanding
Answers
- Hacking Mobile Platforms
Introduction
Structure
Objectives
Mobile platform landscape
Attack vectors in mobile platforms
Android OS architecture
iOS architecture
Jailbreaking/Rooting mobile devices
Mobile application repackaging
Mobile device management
Mobile spyware and privacy concerns
Security guidelines for mobile devices and platforms
Conclusion
Test Your Understanding
Answers
- Hacking Cloud, IoT, and OT Platforms
Introduction
Structure
Objectives
Cloud Computing
Cloud Infrastructure
Cloud Deployment Models
Virtualization
Containers
NIST Cloud Computing Reference Architecture
Cloud computing threats
Cloud attack vectors
Internet of Things (IoT)
IoT Architecture
IoT communication models
Threats to IoT Networks
IoT attack vectors
Operational Technologies (OT) and Industrial Internet of Things (IIoT)
OT and IIoT attack vectors
Cloud, IoT, and OT hacking tools
Conclusion
Test Your Understanding
Answers
- Cryptography
Introduction
Structure
Objectives
Cryptographic primitives
Cryptanalysis tools
Conclusion
Multiple Choice Questions
Answers
- Evading Security Measures
Introduction
Structure
Objectives
Security of an information system
Threat Modelling
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Evading security measures
Detection by Association
Conclusion
Test Your Understanding
Answers
- Practical Exercises on Penetration Testing and Malware Attacks
Structure
Objectives
Exercise 1
Solution
Exercise 2
Solution
Exercise 3
Solution
Exercise 4
Solution
Exercise 5
Solution
Exercise 6
Solution
Exercise 7
Solution
Exercise 8
Solution
Exercise 9
Solution
Exercise 10
Solution
Exercise 11
Solution
Exercise 12
Solution
Exercise 13
Solution
Conclusion
- Roadmap for a Security Professional
Introduction
Structure
Objectives
Cybersecurity Landscape
Network Security
Cyber Forensics
Penetration Testing
Cyber Auditing
Software Professional
Conclusion
- Digital Compliances and Cyber Laws
Introduction
Structure
Objectives
Need for Compliances and Cyber Laws
The privacy debate
Activity
Conclusion
- Self-Assessment 1
Objective
Instructions
Assessment
Answers
- Self-Assessment 2
Objective
Instructions
Assessment
Answers
Index
π SIMILAR VOLUMES
βThis book is a complete guide to prepare for the CEH Certified Ethical Hacker certification exam. Leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 11 exam and advance your career in IT security. The
Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) examβa qualification that tests the cybersecurity professionalβs baseline knowledge of security threats, risks, and counte
<p><span>In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michaelβs concise, focused approach explains every exam objective from a real-w
The CEH Cert Guide is targeted specifically for CEH exam candidates, matching the CEH exam objectives with the effective and popular Cert Guide method of study. The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes four hours and 125 questions, requiring a b