HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Also available in other formats.
Register your product to gain access to bonus material or receive a coupon.
Certified Ethical Hacker (CEH) Exam Cram, Premium Edition eBook and Practice Test
The exciting new Certified Ethical Hacker (CEH) Exam Cram, Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with an enhanced Pearson IT Certification Practice Test. The Premium Edition eBook and Practice Test contains the following items:
Download the sample pages (includes Chapter 6)
Introduction. . . . . . . . . . . . . . . . . . . . . . . xx
CHAPTER 1:
Reconnaissance and Scanning.. . . . . . . . . . . . . . . . . 1
Reconnaissance Types.. . . . . . . . . . . . . . . . . . 1
Active Reconnaissance Techniques. . . . . . . . . . . . . . 22
What Next?.. . . . . . . . . . . . . . . . . . . . . 32
CHAPTER 2:
Enumeration and Vulnerability Scanning.. . . . . . . . . . . . . 33
Scanning.. . . . . . . . . . . . . . . . . . . . . . 33
Scanning Process.. . . . . . . . . . . . . . . . . . . 43
Network Packet Capture.. . . . . . . . . . . . . . . . . 52
Vulnerability Scanning. . . . . . . . . . . . . . . . . . 57
What Next?.. . . . . . . . . . . . . . . . . . . . . 63
CHAPTER 3:
System Hacking. . . . . . . . . . . . . . . . . . . . . . 65
CEH Methodology.. . . . . . . . . . . . . . . . . . . 65
Pass the Hash.. . . . . . . . . . . . . . . . . . . . . 73
Spyware. . . . . . . . . . . . . . . . . . . . . . . 79
What Next?.. . . . . . . . . . . . . . . . . . . . . 92
CHAPTER 4:
Malware.. . . . . . . . . . . . . . . . . . . . . . . . 93
Malware Types.. . . . . . . . . . . . . . . . . . . . 94
Viruses. . . . . . . . . . . . . . . . . . . . . . . 108
Protecting Against Malware.. . . . . . . . . . . . . . . . 115
What Next?.. . . . . . . . . . . . . . . . . . . . . 122
CHAPTER 5:
Packet Sniffing and Social Engineering.. . . . . . . . . . . . . 123
Social Engineering.. . . . . . . . . . . . . . . . . . . 123
Packet Sniffing.. . . . . . . . . . . . . . . . . . . . 138
What Next?.. . . . . . . . . . . . . . . . . . . . . 150
CHAPTER 6:
Denial of Service and Session Hijacking.. . . . . . . . . . . . . 151
Denial of Service. . . . . . . . . . . . . . . . . . . . 151
Session Hijacking.. . . . . . . . . . . . . . . . . . . 165
What Next?.. . . . . . . . . . . . . . . . . . . . . 172
CHAPTER 7:
Evading Security Measures. . . . . . . . . . . . . . . . . . 173
Intrusion Detection Systems. . . . . . . . . . . . . . . . 173
Firewalls and Honeypots.. . . . . . . . . . . . . . . . . 183
Virtual Private Networks.. . . . . . . . . . . . . . . . . 189
IDS Evasion Techniques.. . . . . . . . . . . . . . . . . 192
Firewall Evasion Techniques. . . . . . . . . . . . . . . . 198
What Next?.. . . . . . . . . . . . . . . . . . . . . 204
CHAPTER 8:
Hacking Web Servers and Web Applications.. . . . . . . . . . . 205
Web Servers.. . . . . . . . . . . . . . . . . . . . . 205
Web Applications.. . . . . . . . . . . . . . . . . . . 214
What Next?.. . . . . . . . . . . . . . . . . . . . . 232
CHAPTER 9:
Hacking Wireless.. . . . . . . . . . . . . . . . . . . . . 233
Wireless Technology.. . . . . . . . . . . . . . . . . . 233
Hacking Wireless.. . . . . . . . . . . . . . . . . . . 245
What Next?.. . . . . . . . . . . . . . . . . . . . . 258
CHAPTER 10:
Hacking Mobile.. . . . . . . . . . . . . . . . . . . . . . 259
Mobile Technologies.. . . . . . . . . . . . . . . . . . 259
Mobile Threats. . . . . . . . . . . . . . . . . . . . 274
What Next?.. . . . . . . . . . . . . . . . . . . . . 282
CHAPTER 11:
IOT and OT Hacking. . . . . . . . . . . . . . . . . . . . 283
IoT Fundamentals. . . . . . . . . . . . . . . . . . . 283
What Next?.. . . . . . . . . . . . . . . . . . . . . 308
CHAPTER 12:
Cloud Computing and Hacking.. . . . . . . . . . . . . . . . 309
Cloud Fundamentals.. . . . . . . . . . . . . . . . . . 309
What Next?.. . . . . . . . . . . . . . . . . . . . . 331
CHAPTER 13:
Cryptography. . . . . . . . . . . . . . . . . . . . . . . 333
Cryptography Concepts.. . . . . . . . . . . . . . . . . 333
PKI. . . . . . . . . . . . . . . . . . . . . . . . 349
Cryptographic Attacks.. . . . . . . . . . . . . . . . . . 357
What Next?.. . . . . . . . . . . . . . . . . . . . . 365
Glossary.. . . . . . . . . . . . . . . . . . . . . . . . 367
Index. . . . . . . . . . . . . . . . . . . . . . . . . . 391
12/7/2021, TOC, 978137513444