𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking

✍ Scribed by Mohd Sohaib


Publisher
BPB Publications
Year
2022
Tongue
English
Leaves
786
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more. KEY FEATURES ● Courseware and practice papers with solutions for C.E.H. v11. ● Includes hacking tools, social engineering techniques, and live exercises. ● Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing. DESCRIPTION The 'Certified Ethical Hacker's Guide' summarises all the ethical hacking and penetration testing fundamentals you'll need to get started professionally in the digital security landscape. The readers will be able to approach the objectives globally, and the knowledge will enable them to analyze and structure the hacks and their findings in a better way. The book begins by making you ready for the journey of a seasonal, ethical hacker. You will get introduced to very specific topics such as reconnaissance, social engineering, network intrusion, mobile and cloud hacking, and so on. Throughout the book, you will find many practical scenarios and get hands-on experience using tools such as Nmap, BurpSuite, OWASP ZAP, etc. Methodologies like brute-forcing, wardriving, evil twining, etc. are explored in detail. You will also gain a stronghold on theoretical concepts such as hashing, network protocols, architecture, and data encryption in real-world environments. In the end, the evergreen bug bounty programs and traditional career paths for safety professionals will be discussed. The reader will also have practical tasks and self-assessment exercises to plan further paths of learning and certification. WHAT YOU WILL LEARN ● Learn methodologies, tools, and techniques of penetration testing and ethical hacking. ● Expert-led practical demonstration of tools and tricks like nmap, BurpSuite, and OWASP ZAP. ● Learn how to perform brute forcing, wardriving, and evil twinning. ● Learn to gain and maintain access to remote systems. ● Prepare detailed tests and execution plans for VAPT (vulnerability assessment and penetration testing) scenarios. WHO THIS BOOK IS FOR This book is intended for prospective and seasonal cybersecurity lovers who want to master cybersecurity and ethical hacking. It also assists software engineers, quality analysts, and penetration testing companies who want to keep up with changing cyber risks. TABLE OF CONTENTS 1. Cyber Security, Ethical Hacking, and Penetration Testing 2. CEH v11 Prerequisites and Syllabus 3. Self-Assessment 4. Reconnaissance 5. Social Engineering 6. Scanning Networks 7. Enumeration 8. Vulnerability Assessment 9. System Hacking 10. Session Hijacking 11. Web Server Hacking 12. Web Application Hacking 13. Hacking Wireless Networks 14. Hacking Mobile Platforms 15. Hacking Clout, IoT, and OT Platforms 16. Cryptography 17. Evading Security Measures 18. Practical Exercises on Penetration Testing and Malware Attacks 19. Roadmap for a Security Professional 20. Digital Compliances and Cyber Laws 21. Self-Assessment-1 22. Self-Assessment-2

✦ Table of Contents


Table of Contents

  1. Cyber Security, Ethical Hacking, and Penetration Testing

Introduction

Structure

Objectives

The Ten Thousand Feet View

Cyber Security

Free comic strip subscription service

Electronic health record service

Ethical Hacking

Phases of a Hack

Penetration testing

Conclusion

  1. CEH v11 Prerequisites and Syllabus

Introduction

Structure

Objectives

Certified Ethical Hacker

Version 10 & 11

Prerequisites

Modes of study and examination

Option 1: ECC Exam voucher

Option 2: VUE Exam voucher

Conclusion

  1. Self-Assessment

Introduction

Structure

Objectives

SECTION 'A'

Information Security and Penetration Testing

SECTION 'B'

EC-Council CEH

Answers

Conclusion

  1. Reconnaissance

Introduction

Structure

Objectives

Understanding Reconnaissance

Financial Information

Technology Stack

Workforce and Clientele

Operating Environment

Network Configurations

Web content

Conclusion

Test Your Understanding

Answers

  1. Social Engineering

Introduction

Structure

Objectives

Social Engineering: The Bookie Story

Social Engineering Methodology

Social Engineering Techniques

Tools of Social Engineering

Social Engineering Countermeasures

Conclusion

Test Your Understanding

Answers

  1. Scanning Networks

Introduction

Structure

Objectives

Anatomy of a Computer Network

Live Host Discovery

Port Scan and Service Discovery

TCP Scan

UDP Scan

Banner Grabbing

Network Mapping

Conclusion

Test Your Understanding

Answers

  1. Enumeration

Introduction

Structure

Objectives

Enumeration as a successor to network scan

NetBIOS enumeration

SNMP Enumeration

LDAP enumeration

NTP enumeration

NTP enumeration commands

SMTP enumeration

DNS enumeration

Conclusion

Test Your Understanding

Answers

  1. Vulnerability Assessment

Introduction

Structure

Objectives

Process Overview

Residual Risk

DevSecOps

Conclusion

Test Your Understanding

Answers

  1. System Hacking

Introduction

Structure

Objectives

System hacking stages

Password cracking

Password storage in modern systems

Security Account Manager (SAM)

NTLM Authentication

Kerberos authentication

Rainbow tables

Backdoor Entry – Trojans

Password cracking defense checklist

Privilege escalation

Horizontal privilege escalation

Vertical privilege escalation

DLL hijacking

Executing application

Remote execution tools

Hiding files and covering tracks

Conclusion

Test Your Understanding

Answers

  1. Session Hijacking

Introduction

Structure

Objectives

TCP and Web sessions

Network-level session hijacking

TCP session hijacking

UDP hijacking

Application-level session hijacking

Countermeasures to session hijacking

Conclusion

Test Your Understanding

Answers

  1. Web Server Hacking

Introduction

Structure

Objectives

Web server

Tools for web server hacking

Conclusion

Test Your Understanding

Answers

  1. Web Application Hacking

Introduction

Structure

Objectives

Tools used in web application hacking

Conclusion

Test Your Understanding

Answers

  1. Hacking Wireless Networks

Introduction

Structure

Objectives

The wireless connectivity

Wireless standards

802.11a

802.11b

802.11g

IEEE 802.11ac (Wi-Fi)

802.16 (WiMAX)

Bluetooth

Wired Equivalent Privacy (WEP)

Wi-Fi Protected Access (WPA)

WPA2

WPA3

Wireless Hacking Methodology

Wireless network discovery

Wireless network mapping

Wireless network analysis

Wireless network attacks

Deauthentication attack

WPA Handshake Capture

Man-in-the-Middle Attack (MITM)

Wireless Honeypots

Conclusion

Test Your Understanding

Answers

  1. Hacking Mobile Platforms

Introduction

Structure

Objectives

Mobile platform landscape

Attack vectors in mobile platforms

Android OS architecture

iOS architecture

Jailbreaking/Rooting mobile devices

Mobile application repackaging

Mobile device management

Mobile spyware and privacy concerns

Security guidelines for mobile devices and platforms

Conclusion

Test Your Understanding

Answers

  1. Hacking Cloud, IoT, and OT Platforms

Introduction

Structure

Objectives

Cloud Computing

Cloud Infrastructure

Cloud Deployment Models

Virtualization

Containers

NIST Cloud Computing Reference Architecture

Cloud computing threats

Cloud attack vectors

Internet of Things (IoT)

IoT Architecture

IoT communication models

Threats to IoT Networks

IoT attack vectors

Operational Technologies (OT) and Industrial Internet of Things (IIoT)

OT and IIoT attack vectors

Cloud, IoT, and OT hacking tools

Conclusion

Test Your Understanding

Answers

  1. Cryptography

Introduction

Structure

Objectives

Cryptographic primitives

Cryptanalysis tools

Conclusion

Multiple Choice Questions

Answers

  1. Evading Security Measures

Introduction

Structure

Objectives

Security of an information system

Threat Modelling

Intrusion Detection System (IDS)

Intrusion Prevention System (IPS)

Evading security measures

Detection by Association

Conclusion

Test Your Understanding

Answers

  1. Practical Exercises on Penetration Testing and Malware Attacks

Structure

Objectives

Exercise 1

Solution

Exercise 2

Solution

Exercise 3

Solution

Exercise 4

Solution

Exercise 5

Solution

Exercise 6

Solution

Exercise 7

Solution

Exercise 8

Solution

Exercise 9

Solution

Exercise 10

Solution

Exercise 11

Solution

Exercise 12

Solution

Exercise 13

Solution

Conclusion

  1. Roadmap for a Security Professional

Introduction

Structure

Objectives

Cybersecurity Landscape

Network Security

Cyber Forensics

Penetration Testing

Cyber Auditing

Software Professional

Conclusion

  1. Digital Compliances and Cyber Laws

Introduction

Structure

Objectives

Need for Compliances and Cyber Laws

The privacy debate

Activity

Conclusion

  1. Self-Assessment 1

Objective

Instructions

Assessment

Answers

  1. Self-Assessment 2

Objective

Instructions

Assessment

Answers

Index


πŸ“œ SIMILAR VOLUMES


Ceh Certified Ethical Hacker Cert Guide
✍ Omar Santos, Michael Gregg πŸ“‚ Library πŸ“… 2021 πŸ› Pearson It Certification 🌐 English

<div> This book is a complete guide to prepare for the CEH Certified Ethical Hacker certification exam. </div> <div> <br></div> <div> <br></div> <div> Leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 11

CEH Certified Ethical Hacker Cert Guide
✍ Omar Santos, Michael Gregg πŸ“‚ Library πŸ“… 2022 πŸ› Pearson IT Certification 🌐 English

β€œThis book is a complete guide to prepare for the CEH Certified Ethical Hacker certification exam. Leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 11 exam and advance your career in IT security. The

Certified Ethical Hacker (CEH) Preparati
✍ Ahmed Sheikh πŸ“‚ Library πŸ“… 2021 πŸ› Apress 🌐 English

Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam―a qualification that tests the cybersecurity professional’s baseline knowledge of security threats, risks, and counte

Certified Ethical Hacker (CEH) Version 9
✍ Michael Gregg πŸ“‚ Library πŸ› Pearson IT Certification 🌐 English

<p><span>In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael’s concise, focused approach explains every exam objective from a real-w

Pearson Education: Certified Ethical Hac
✍ Pearson Education, Omar Santos, Michael Gregg πŸ“‚ Library πŸ“… 2020 🌐 English

The CEH Cert Guide is targeted specifically for CEH exam candidates, matching the CEH exam objectives with the effective and popular Cert Guide method of study. The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes four hours and 125 questions, requiring a b