Rights Contact Login For More Details
- Wiley
More About This Title CEHv8: Certified Ethical Hacker Version 8 Study Guide
- English
English
Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide
Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and much more. A companion website includes additional study tools, Including practice exam and chapter review questions and electronic flashcards.
Security remains the fastest growing segment of IT, and CEH certification provides unique skillsThe CEH also satisfies the Department of Defense’s 8570 Directive, which requires all Information Assurance government positions to hold one of the approved certificationsThis Sybex study guide is perfect for candidates studying on their own as well as those who are taking the CEHv8 courseCovers all the exam objectives with an easy-to-follow approachCompanion website includes practice exam questions, flashcards, and a searchable Glossary of key termsCEHv8: Certified Ethical Hacker Version 8 Study Guide is the book you need when you're ready to tackle this challenging exam
Also available as a set, Ethical Hacking and Web Hacking Set, 9781119072171 with The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition.
- English
English
Sean-Philip Oriyano CEH, CEI, CISSP, is cofounder and vice president of Sonwell & Oriyano, LLC, an IT security consulting and training company based in Las Vegas. Oriyano is a 20-year veteran of the IT industry and is currently an instructor who specializes in infrastructure and security topics for various public and private entities. Sean has served as an IT security instructor for the US Air Force, Navy, and Army at locations both in North America and internationally.
- English
English
Introduction xxi
Assessment Test xxx
Chapter 1 Getting Started with Ethical Hacking 1
Hacking: A Short History 2
The Early Days of Hacking 2
Current Developments 3
Hacking: Fun or Criminal Activity? 4
The Evolution and Growth of Hacking 6
What Is an Ethical Hacker? 7
Ethical Hacking and Penetration Testing 10
Hacking Methodologies 15
Vulnerability Research and Tools 18
Ethics and the Law 18
Summary 20
Exam Essentials 20
Review Questions 21
Chapter 2 System Fundamentals 25
Exploring Network Topologies 26
Working with the Open Systems Interconnection Model 30
Dissecting the TCP/IP Suite 33
IP Subnetting 35
Hexadecimal vs. Binary 35
Exploring TCP/IP Ports 37
Domain Name System 39
Understanding Network Devices 39
Routers and Switches 39
Working with MAC Addresses 41
Proxies and Firewalls 42
Intrusion Prevention and Intrusion Detection Systems 43
Network Security 44
Knowing Operating Systems 46
Windows 46
Mac OS 47
Linux 48
Backups and Archiving 49
Summary 49
Exam Essentials 50
Review Questions 51
Chapter 3 Cryptography 55
Cryptography: Early Applications and Examples 56
History of Cryptography 57
Tracing the Evolution 58
Cryptography in Action 59
So How Does It Work? 60
Symmetric Cryptography 61
Asymmetric, or Public Key, Cryptography 62
Understanding Hashing 68
Issues with Cryptography 69
Applications of Cryptography 71
IPSec 71
Pretty Good Privacy 73
Secure Sockets Layer (SSL) 74
Summary 75
Exam Essentials 75
Review Questions 76
Chapter 4 Footprinting and Reconnaissance 81
Understanding the Steps of
Ethical Hacking 82
Phase 1: Footprinting 82
Phase 2: Scanning 83
Phase 3: Enumeration 83
Phase 4: System Hacking 83
What Is Footprinting? 84
Why Perform Footprinting? 84
Goals of the Footprinting Process 85
Terminology in Footprinting 87
Open Source and Passive Information Gathering 87
Active Information Gathering 87
Pseudonymous Footprinting 88
Internet Footprinting 88
Threats Introduced by Footprinting 88
The Footprinting Process 88
Using Search Engines 89
Location and Geography 91
Social Networking and Information Gathering 91
Financial Services and Information Gathering 92
The Value of Job Sites 92
Working with E-mail 93
Competitive Analysis 94
Google Hacking 95
Gaining Network Information 96
Social Engineering: The Art of Hacking Humans 96
Summary 97
Exam Essentials 97
Review Questions 98
Chapter 5 Scanning Networks 103
What Is Network Scanning? 104
Checking for Live Systems 106
Wardialing 106
Wardriving 108
Pinging 108
Port Scanning 110
Checking for Open Ports 110
Types of Scans 112
Full Open Scan 112
Stealth Scan, or Half-open Scan 112
Xmas Tree Scan 113
FIN Scan 114
NULL Scan 114
ACK Scanning 115
UDP Scanning 115
OS Fingerprinting 116
Banner Grabbing 117
Countermeasures 118
Vulnerability Scanning 119
Drawing Network Diagrams 119
Using Proxies 120
Setting a Web Browser to Use a Proxy 121
Summary 122
Exam Essentials 122
Review Questions 123
Chapter 6 Enumeration of Services 127
A Quick Review 128
Footprinting 128
Scanning 128
What Is Enumeration? 129
Windows Basics 130
Users 130
Groups 131
Security Identifiers 132
Services and Ports of Interest 132
Commonly Exploited Services 133
NULL Sessions 135
SuperScan 136
The PsTools Suite 137
Enumeration with SNMP 137
Management Information Base 138
SNScan 139
Unix and Linux Enumeration 139
finger 140
rpcinfo 140
showmount 140
Enum4linux 141
LDAP and Directory Service Enumeration 141
Enumeration Using NTP 142
SMTP Enumeration 143
Using VRFY 143
Using EXPN 144
Using RCPT TO 144
SMTP Relay 145
Summary 145
Exam Essentials 146
Review Questions 147
Chapter 7 Gaining Access to a System 151
Up to This Point 152
System Hacking 154
Authentication on Microsoft Platforms 165
Executing Applications 169
Covering Your Tracks 170
Summary 172
Exam Essentials 173
Review Questions 174
Chapter 8 Trojans, Viruses, Worms, and Covert Channels 179
Malware 180
Malware and the Law 182
Categories of Malware 183
Viruses 184
Worms 190
Spyware 192
Adware 193
Scareware 193
Trojans 194
Overt and Covert Channels 203
Summary 205
Exam Essentials 205
Review Questions 206
Chapter 9 Sniffers 209
Understanding Sniffers 210
Using a Sniffer 212
Sniffing Tools 213
Wireshark 214
TCPdump 218
Reading Sniffer Output 221
Switched Network Sniffing 224
MAC Flooding 224
ARP Poisoning 225
MAC Spoofing 226
Port Mirror or SPAN Port 227
On the Defensive 227
Mitigating MAC Flooding 228
Detecting Sniffing Attacks 230
Exam Essentials 230
Summary 230
Review Questions 231
Chapter 10 Social Engineering 235
What Is Social Engineering? 236
Why Does Social Engineering Work? 237
Why is Social Engineering Successful? 238
Social-Engineering Phases 239
What Is the Impact of Social Engineering? 239
Common Targets of Social Engineering 240
What Is Social Networking? 241
Mistakes in Social Media and Social Networking 243
Countermeasures for Social Networking 245
Commonly Employed Threats 246
Identity Theft 250
Protective Measures 250
Know What Information Is Available 251
Summary 252
Exam Essentials 252
Review Questions 254
Chapter 11 Denial of Service 259
Understanding DoS 260
DoS Targets 262
Types of Attacks 262
Buffer Overflow 267
Understanding DDoS 271
DDoS Attacks 271
DoS Tools 273
DDoS Tools 273
DoS Defensive Strategies 276
Botnet-Specific Defenses 277
DoS Pen Testing Considerations 277
Summary 277
Exam Essentials 278
Review Questions 279
Chapter 12 Session Hijacking 283
Understanding Session Hijacking 284
Spoofing vs. Hijacking 286
Active and Passive Attacks 287
Session Hijacking and Web Apps 288
Types of Application-Level Session Hijacking 289
A Few Key Concepts 292
Network Session Hijacking 294
Exploring Defensive Strategies 302
Summary 302
Exam Essentials 303
Review Questions 304
Chapter 13 Web Servers and Web Applications 309
Exploring the Client-Server Relationship 310
The Client and the Server 311
Closer Inspection of a Web Application 311
Vulnerabilities of Web Servers and
Applications 313
Common Flaws and Attack Methods 316
Summary 323
Exam Essentials 323
Review Questions 324
Chapter 14 SQL Injection 329
Introducing SQL Injection 330
Results of SQL Injection 332
The Anatomy of a Web Application 333
Databases and Their Vulnerabilities 334
Anatomy of a SQL Injection Attack 336
Altering Data with a SQL
Injection Attack 339
Injecting Blind 341
Information Gathering 342
Evading Detection Mechanisms 342
SQL Injection Countermeasures 343
Summary 344
Exam Essentials 344
Review Questions 345
Chapter 15 Wireless Networking 349
What Is a Wireless Network? 350
Wi-Fi: An Overview 350
The Fine Print 351
Wireless Vocabulary 353
A Close Examination of Threats 360
Ways to Locate Wireless Networks 364
Choosing the Right Wireless Card 365
Hacking Bluetooth 365
Summary 367
Exam Essentials 368
Review Questions 369
Chapter 16 Evading IDSs, Firewalls, and Honeypots 373
Honeypots, IDSs, and Firewalls 374
The Role of Intrusion Detection Systems 374
Firewalls 379
What’s That Firewall Running? 382
Honeypots 383
Run Silent, Run Deep: Evasion Techniques 383
Evading Firewalls 385
Summary 388
Exam Essentials 388
Review Questions 389
Chapter 17 Physical Security 393
Introducing Physical Security 394
Simple Controls 394
Dealing with Mobile Device Issues 397
Securing the Physical Area 401
Defense in Depth 408
Summary 409
Exam Essentials 409
Review Questions 410
Appendix A Answers to Review Questions 415
Appendix B About the Additional Study Tools 437
Index 441