CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker



Similar documents
CEH Version8 Course Outline

[CEH]: Ethical Hacking and Countermeasures

EC Council Certified Ethical Hacker V8

Certified Ethical Hacker Exam Version Comparison. Version Comparison

SONDRA SCHNEIDER JOHN NUNES

CYBERTRON NETWORK SOLUTIONS

Ethical Hacking Course Layout

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Certified Ethical Hacker (CEH)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Council. Certified Ethical Hacker. Program Brochure

Detailed Description about course module wise:

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

CRYPTUS DIPLOMA IN IT SECURITY

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

GSEC GIAC Security. Essentials Certification ONE ALL IN EXAM GUIDE. Ric Messier. Singapore Sydney Toronto

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

ETHICAL HACKING. By REAL TIME FACULTY

Study Guide. Professional vsphere 4. VCP VMware Certified. (ExamVCP4IO) Robert Schmidt. IVIC GratAf Hill

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Network Security Essentials:

FSP-201: Ethical Hacking & IT Security

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

INFORMATION SECURITY TRAINING


Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Ethical Hacking v7 40 H.

Course Content: Session 1. Ethics & Hacking

Build Your Own Security Lab

ETHICAL HACKING CYBER SECURITY

Hackers are here. Where are you?

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Course Title: Course Description: Course Key Objective: Fee & Duration:

Network Security: A Practical Approach. Jan L. Harrington

Description: Objective: Attending students will learn:

CS Ethical Hacking Spring 2016

Security Metrics. A Beginner's Guide. Caroline Wong. Mc Graw Hill. Singapore Sydney Toronto. Lisbon London Madrid Mexico City Milan New Delhi San Juan

Open Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier

Certified Cyber Security Analyst VS-1160

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

ASK PC Certified Information Systems Security Expert - CISSE

Certified Cyber Security Expert V Web Application Development

CIS 4204 Ethical Hacking Fall, 2014

CRYPTOGRAPHY AND NETWORK SECURITY

Security + Certification (ITSY 1076) Syllabus

EC-Council Certified Security Analyst (ECSA)

EC-Council. Program Brochure. EC-Council. Page 1

Quick Start Guide to Ethical Hacking

Certified Penetration Testing Specialist

Network Attacks and Defenses

Networking: EC Council Network Security Administrator NSA

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

RMAR Technologies Pvt. Ltd.

Eleventh Hour Security+

CERTIFIED PENETRATION TESTING CONSULTANT

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

EC-Council Ethical Hacking and Countermeasures

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG

Compensating the Sales Force

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Hackers are here. Where are you?

Cybercrime in Canadian Criminal Law

Certified Security Analyst

Securing Cisco Network Devices (SND)

LINUX / INFORMATION SECURITY

FORBIDDEN - Ethical Hacking Workshop Duration

Certified Penetration Testing Specialist

The Information Security Problem

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Assessing Network Security

Tim Bovles WILEY. Wiley Publishing, Inc.

SCP - Strategic Infrastructure Security

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

A Systems Engineering Approach to Developing Cyber Security Professionals

Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4

Open Source Security Tools

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

InfoSec Academy Pen Testing & Hacking Track

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

PMP Project Management Professional Study Guide, Third Edition

Principles of Information Assurance Syllabus

ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York

RHCSA 7RHCE Red Haf Linux Certification Practice

Ethical Hacking & Cyber Security Workshop

Manager's Guide to Performance Management

The International Certification in IT Security Training Program. fcch. foresec certified computer hacking

Learn Ethical Hacking, Become a Pentester

Transcription:

ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill is an independent entity from the Internationa] Council of E-Commerce Consultants* (EC-Council) and is not affiliated with EC-Council in any manner. This study/training guide and/or material is not sponsored by, endorsed by, or affiliated with EC-Council in any manner. This publication and CD may be used in assisting students to prepare for The Certified Ethical Hacker (CEH) exam. Neither EC-Council nor McGraw-Hill warrant that use of this publication and CD will ensure passing any exam. CEH is a trademark or registered trademark of EC-Council in the United States and certain other countries. All other trademarks are trademarks of their respective owners.

CONTENTS AT A GMi#p Chapter I Ethical Hacking Basics I Chapter 2 Cryptography 101 27 Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker... 53 Chapter 4 Scanning and Enumeration 85 Chapter 5 Hacking Through the Network: Sniffers and Evasion 121 Chapter 6 Attacking a System 155 Chapter 7 Low Tech: Social Engineering and Physical Security 193 Chapter 8 Web-Based Hacking: Servers and Applications 219 Chapter 9 Wireless Network Hacking 251 Chapter 10 Trojans and Other Attacks 283 Chapter I I The Pen Test: Putting It All Together 311 Appendix A Tool, Sites, and References 325 Appendix B About the CD 337 Glossary 339 Index 373 IX

CONTENTS Acknowledgments Introduction xvii xix Chapter I Ethical Hacking Basics I Introduction to Ethical Hacking 2 Security Basics: CIA 2 Defining the Ethical Hacker 5 Hacking Terminology and Attacks 11 Legal Hacking: Laws and Guidelines You Need to Know 14 U.S. Cyber Crime Laws 15 International Cyber Crime Laws 18 Chapter Review 20 Questions 22 Answers 24 Chapter 2 Cryptography 101 27 Cryptography and Encryption Overview 28 Encryption Algorithms and Techniques 28 PKI, the Digital Certificate, and Digital Signatures 38 The PKI System 39 Digital Certificates 40 Digital Signatures 43 Encrypted Communication and Cryptography Attacks 44 Data Encryption: At Rest and While Communicating 44 Cryptography Attacks 46 Chapter Review 47 Questions 49 Answers 51 Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker... 53 Vulnerability Research 54 Footprinting 58 Footprinting with DNS 62 Determining Network Range 71 Google Hacking 74 Other Tips and Tools 77 Chapter Review 78 Questions 81 Answers 83 xi

CEH Certified Ethical Hacker All-in-One Exam Guide xii Chapter 4 Scanning and Enumeration Scanning for Targets Identifying Active Machines Port Scanning Other Scanning Tips and Tools Enumeration Windows Security Basics... Enumeration Techniques Chapter Review Questions Answers 85 86 87 91 105 107 108 110 113 117 119 Chapter 5 Hacking Through the Network: Sniffers and Evasion 121 Sniffing 122 Communications Basics 122 Sniffing Techniques and Tools 127 Network Roadblocks 136 Intrusion Detection 136 Firewalls and Honeypots 144 Chapter Review 149 Questions 151 Answers 153 Chapter 6 Attacking a System 155 Windows System Hacking 156 Password Cracking 156 Escalating Privileges and Maintaining Stealth 168 Linux Hacking 177 Linux Essentials 177 Hardening a Linux Machine 184 Chapter Review 187 Questions 189 Answers 192 Chapter 7 Low Tech: Social Engineering and Physical Security 193 Social Engineering 194 Human-Based Attacks 195 Computer-Based Attacks 197 Physical Security 202 Physical Security 101 202 Chapter Review 213 Questions 214 Answers 217

Contents xiii Chapter 8 Web-Based Hacking: Servers and Applications 219 Attacking Web Servers 220 Web Services Architecture 220 Web Attacks 225 Web Applications 230 Application Attacks 230 Protecting Your Web Resources 240 Chapter Review 244 Questions 246 Answers 249 Chapter 9 Wireless Network Hacking 251 Wireless 101 252 Network Architecture and Standards 252 Finding and Identifying Wireless Networks 259 Wireless Hacking Wireless Attacks 265 Bluetooth Attacks 273 Chapter Review 274 Questions 279 Answers 282 Chapter 10 Trojans and Other Attacks 283 The "Malware" Attacks 284 Trojans, Backdoors, Viruses, and Worms 284 Remaining Attacks 295 Denial of Service 295 Session Hijacking Chapter Review 301 Questions 306 Answers 308 Chapter I I The Pen Test: Putting It All Together 311 Methodology and Steps 312 The Security Assessments 312 Security Assessment Deliverables 318 Chapter Review 319 265 298 Questions 321 Answers 323 Appendix A Tool, Sites, and References 325 Vulnerability Research Sites 325 Footprinting Tools 326 Website Research Tools 326

CEH Certified Ethical Hacker All-in-One Exam Guide xiv DNS and WHOIS Tools 326 Traceroute Tools and Links 326 Website Mirroring Tools and Sites 327 E-mail Tracking 327 Google Hacking 327 Scanning and Enumeration Tools 327 Ping Sweep 327 Scanning Tools 328 War Dialing 328 Banner Grabbing 328 Vulnerability Scanning 328 Proxy, Anonymizer, and Tunneling 329 Enumeration 329 System Hacking Tools 330 Password Hacking Tools 330 Sniffing 330 Keyloggers and Screen Capture 330 Covering Tracks 331 Packet Crafting/Spoofing 331 Session Hijacking 331 Cryptography and Encryption 331 Encryption Tools 331 Hash Tools 332 Steganography 332 Cryptanalysis 332 Sniffing 332 Packet Capture 332 Wireless 333 MAC Flooding/Spoofing 333 ARP Poisoning 333 Trojans and Malware 333 Wrappers 333 Monitoring Tools 333 Attack Tools 334 IDS 334 Evasion Tools 334 Wireless 334 Web Attacks 335 SQL Injection 335 Miscellaneous 336 Pen Test Suites 336 Extras 336 Linux Distributions 336 Tools, Sites, and References Disclaimer 336

Contents XV Appendix B About the CD 337 System Requirements 337 Installing and Running MasterExam 337 MasterExam 337 Electronic Book 338 Help 338 Removing Installation(s) 338 Technical Support 338 LearnKey Technical Support 338 Glossary 339 Index 373