CONTENTS

Acknowledgments

Introduction

Chapter 1    Getting Started: Essential Knowledge

Security 101

Essentials

Security Basics

Introduction to Ethical Hacking

Hacking Terminology

The Ethical Hacker

Chapter Review

Questions

Answers

Chapter 2    Reconnaissance: Information Gathering for the Ethical Hacker

Footprinting

Passive Footprinting

Active Footprinting

Footprinting Methods and Tools

Search Engines

Website and E-mail Footprinting

DNS Footprinting

Network Footprinting

Other Tools

Chapter Review

Questions

Answers

Chapter 3    Scanning and Enumeration

Fundamentals

TCP/IP Networking

Subnetting

Scanning Methodology

Identifying Targets

Port Scanning

Evasion

Vulnerability Scanning

Enumeration

Windows System Basics

Enumeration Techniques

Chapter Review

Questions

Answers

Chapter 4    Sniffing and Evasion

Essentials

Network Knowledge for Sniffing

Active and Passive Sniffing

Sniffing Tools and Techniques

Techniques

Tools

Evasion

Devices Aligned Against You

Evasion Techniques

Chapter Review

Questions

Answers

Chapter 5    Attacking a System

Getting Started

Windows Security Architecture

Linux Security Architecture

Methodology

Hacking Steps

Authentication and Passwords

Privilege Escalation and Executing Applications

Hiding Files and Covering Tracks

Chapter Review

Questions

Answers

Chapter 6    Web-Based Hacking: Servers and Applications

Web Servers

Web Organizations

Attack Methodology

Web Server Architecture

Web Server Attacks

Attacking Web Applications

Application Attacks

Countermeasures

Chapter Review

Questions

Answers

Chapter 7    Wireless Network Hacking

Wireless Networking

Wireless Terminology, Architecture, and Standards

Wireless Hacking

The Mobile World

Mobile Platforms and Attacks

Mobile Attacks

Chapter Review

Questions

Answers

Chapter 8    Security in Cloud Computing

Cloud Computing

Cloud Security

Threats and Attacks

Chapter Review

Questions

Answers

Chapter 9    Trojans and Other Attacks

The “Malware” Attacks

Trojans

Viruses and Worms

Remaining Attacks

Denial of Service

Session Hijacking

Chapter Review

Questions

Answers

Chapter 10  Cryptography 101

Cryptography and Encryption Overview

Encryption Algorithms and Techniques

PKI, the Digital Certificate, and Digital Signatures

The PKI System

Digital Certificates

Digital Signatures

Encrypted Communication and Cryptography Attacks

Encrypted Communication

Cryptography Attacks

Chapter Review

Questions

Answers

Chapter 11  Low Tech: Social Engineering and Physical Security

Social Engineering

Human-Based Attacks

Computer-Based Attacks

Mobile-Based Attacks

Physical Security

Physical Security 101

Chapter Review

Questions

Answers

Chapter 12  The Pen Test: Putting It All Together

Methodology and Steps

The Security Assessments

Security Assessment Deliverables

Guidelines

More Terminology

Chapter Review

Questions

Answers

Appendix A Tool, Sites, and References

Vulnerability Research Sites

Footprinting Tools

People Search Tools

Competitive Intelligence

Tracking Online Reputation

Website Research/Web Updates Tools

DNS and Whois Tools

Traceroute Tools and Links

Website Mirroring Tools and Sites

E-mail Tracking

Google Hacking

Scanning and Enumeration Tools

Ping Sweep

Scanning Tools

Banner Grabbing

Vulnerability Scanning

Network Mapping

Proxy, Anonymizer, and Tunneling

Enumeration

SNMP Enumeration

LDAP Enumeration

NTP Enumeration

Registry Tools

Windows Service Monitoring Tools

File/Folder Integrity Checkers

System Hacking Tools

Default Password Search Links

Password Hacking Tools

DoS/DDos

Sniffing

Keyloggers and Screen Capture

Privilege Escalation

Executing Applications

Spyware

Mobile Spyware

Covering Tracks

Packet Crafting/Spoofing

Session Hijacking

Clearing Tracks

Cryptography and Encryption

Encryption Tools

Hash Tools

Steganography

Stego Detection

Cryptanalysis

Sniffing

Packet Capture

Wireless

MAC Flooding/Spoofing

ARP Poisoning

Wireless

Discovery

Attack and Analysis

Packet Sniffing

WEP/WPA Cracking

Bluetooth

Mobile Attacks

Mobile Wireless Discovery

Mobile Device Tracking

Rooting/Jailbreaking

MDM

Trojans and Malware

Anti-Malware (AntiSpyware and Anitvirus)

Crypters and Packers

Monitoring Tools

Attack Tools

Web Attacks

Attack tools

SQL Injection

Miscellaneous

Cloud Security

IDS

Evasion Tools

Pen Test Suites

VPN/FW Scanner

Social Engineering

Extras

Linux Distributions

Tools, Sites, and References Disclaimer

Appendix B About the Download

System Requirements

Installing and Running Total Tester

About Total Tester

Technical Support

Glossary

Index