You are previewing CEH Certified Ethical Hacker All-in-One Exam Guide.
O'Reilly logo
CEH Certified Ethical Hacker All-in-One Exam Guide

Book Description

Get complete coverage of all the objectives included on the EC-Council’s Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.

Table of Contents

  1. Cover Page
  2. CEH Certified Ethical Hacker
  3. Copyright Page
  4. CD Page
  5. Dedication
  6. About The Author
  7. Contents At A Glance
  8. Contents
  9. Acknowledgments
  10. Introduction
  11. Chapter 1 Ethical Hacking Basics
    1. Introduction to Ethical Hacking
      1. Security Basics: CIA
      2. Defining the Ethical Hacker
      3. Hacking Terminology and Attacks
    2. Legal Hacking: Laws and Guidelines You Need to Know
      1. U.S. Cyber Crime Laws
      2. International Cyber Crime Laws
    3. Chapter Review
      1. Questions
      2. Answers
  12. Chapter 2 Cryptography 101
    1. Cryptography and Encryption Overview
      1. Encryption Algorithms and Techniques
    2. PKI, the Digital Certificate, and Digital Signatures
      1. The PKI System
      2. Digital Certificates
      3. Digital Signatures
    3. Encrypted Communication and Cryptography Attacks
      1. Data Encryption: At Rest and While Communicating
      2. Cryptography Attacks
    4. Chapter Review
      1. Questions
      2. Answers
  13. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker
    1. Vulnerability Research
    2. Footprinting
      1. Footprinting with DNS
      2. Determining Network Range
      3. Google Hacking
      4. Other Tips and Tools
    3. Chapter Review
      1. Questions
      2. Answers
  14. Chapter 4 Scanning and Enumeration
    1. Scanning for Targets
      1. Identifying Active Machines
      2. Port Scanning
      3. Other Scanning Tips and Tools
    2. Enumeration
      1. Windows Security Basics
      2. Enumeration Techniques
    3. Chapter Review
      1. Questions
      2. Answers
  15. Chapter 5 Hacking Through the Network: Sniffers and Evasion
    1. Sniffing
      1. Communications Basics
      2. Sniffing Techniques and Tools
    2. Network Roadblocks
      1. Intrusion Detection
      2. Firewalls and Honeypots
    3. Chapter Review
      1. Questions
      2. Answers
  16. Chapter 6 Attacking a System
    1. Windows System Hacking
      1. Password Cracking
      2. Escalating Privileges and Maintaining Stealth
    2. Linux Hacking
      1. Linux Essentials
      2. Hardening a Linux Machine
    3. Chapter Review
      1. Questions
      2. Answers
  17. Chapter 7 Low Tech: Social Engineering and Physical Security
    1. Social Engineering
      1. Human-Based Attacks
      2. Computer-Based Attacks
    2. Physical Security
      1. Physical Security 101
    3. Chapter Review
      1. Questions
      2. Answers
  18. Chapter 8 Web-Based Hacking: Servers and Applications
    1. Attacking Web Servers
      1. Web Services Architecture
      2. Web Attacks
    2. Web Applications
      1. Application Attacks
      2. Protecting Your Web Resources
    3. Chapter Review
      1. Questions
      2. Answers
  19. Chapter 9 Wireless Network Hacking
    1. Wireless 101
      1. Network Architecture and Standards
      2. Finding and Identifying Wireless Networks
    2. Wireless Hacking
      1. Wireless Attacks
      2. Bluetooth Attacks
    3. Chapter Review
      1. Questions
      2. Answers
  20. Chapter 10 Trojans and Other Attacks
    1. The “Malware” Attacks
      1. Trojans, Backdoors, Viruses, and Worms
    2. Remaining Attacks
      1. Denial of Service
      2. Session Hijacking
    3. Chapter Review
      1. Questions
      2. Answers
  21. Chapter 11 The Pen Test: Putting It All Together
    1. Methodology and Steps
      1. The Security Assessments
      2. Security Assessment Deliverables
    2. Chapter Review
      1. Questions
      2. Answers
  22. Appendix A Tool, Sites, and References
    1. Vulnerability Research Sites
    2. Footprinting Tools
      1. Website Research Tools
      2. DNS and WHOIS Tools
      3. Traceroute Tools and Links
      4. Website Mirroring Tools and Sites
      5. E-mail Tracking
      6. Google Hacking
    3. Scanning and Enumeration Tools
      1. Ping Sweep
      2. Scanning Tools
      3. War Dialing
      4. Banner Grabbing
      5. Vulnerability Scanning
      6. Proxy, Anonymizer, and Tunneling
      7. Enumeration
    4. System Hacking Tools
      1. Password Hacking Tools
      2. Sniffing
      3. Keyloggers and Screen Capture
      4. Covering Tracks
      5. Packet Crafting/Spoofing
      6. Session Hijacking
    5. Cryptography and Encryption
      1. Encryption Tools
      2. Hash Tools
      3. Steganography
      4. Cryptanalysis
    6. Sniffing
      1. Packet Capture
      2. Wireless
      3. MAC Flooding/Spoofing
      4. ARP Poisoning
    7. Trojans and Mal ware
      1. Wrappers
      2. Monitoring Tools
      3. Attack Tools
    8. IDS
      1. Evasion Tools
    9. Wireless
    10. Web Attacks
      1. SQL Injection
    11. Miscellaneous
      1. Pen Test Suites
      2. Extras
      3. Linux Distributions
    12. Tools, Sites, and References Disclaimer
  23. Appendix B About the Download
    1. (1) Steps to Download MasterExam
    2. (2) System Requirements
    3. (1) Installing and Running MasterExam
    4. (2) MasterExam
    5. (1) Help
    6. (1) Removing Installation
    7. (1) Technical Support
    8. (2) LearnKey Technical Support
  24. Glossary
  25. Index
  26. MediaCenter Page