Contents
Introduction
Assessment Test
Chapter 1: Getting Started with Ethical Hacking
Hacking: A Short History
What Is an Ethical Hacker?
Summary
Exam Essentials
Review Questions
Chapter 2: System Fundamentals
Exploring Network Topologies
Working with the Open Systems Interconnection Model
Dissecting the TCP/IP Suite
IP Subnetting
Hexadecimal vs. Binary
Exploring TCP/IP Ports
Understanding Network Devices
Working with MAC Addresses
Intrusion Prevention and Intrusion Detection Systems
Network Security
Knowing Operating Systems
Backups and Archiving
Summary
Exam Essentials
Review Questions
Chapter 3: Cryptography
Cryptography: Early Applications and Examples
Cryptography in Action
Understanding Hashing
Issues with Cryptography
Applications of Cryptography
Summary
Exam Essentials
Review Questions
Chapter 4: Footprinting and Reconnaissance
Understanding the Steps of Ethical Hacking
What Is Footprinting?
Terminology in Footprinting
Threats Introduced by Footprinting
The Footprinting Process
Summary
Exam Essentials
Review Questions
Chapter 5: Scanning Networks
What Is Network Scanning?
Checking for Live Systems
Checking for Open Ports
Types of Scans
OS Fingerprinting
Banner Grabbing
Countermeasures
Vulnerability Scanning
Drawing Network Diagrams
Using Proxies
Summary
Exam Essentials
Review Questions
Chapter 6: Enumeration of Services
A Quick Review
What Is Enumeration?
Windows Basics
Enumeration with SNMP
Unix and Linux Enumeration
LDAP and Directory Service Enumeration
Enumeration Using NTP
SMTP Enumeration
Using
EXPN
Using
RCPT TO
SMTP Relay
Summary
Exam Essentials
Review Questions
Chapter 7: Gaining Access to a System
Up to This Point
Summary
Exam Essentials
Review Questions
Chapter 8: Trojans, Viruses, Worms, and Covert Channels
Malware
Overt and Covert Channels
Summary
Exam Essentials
Review Questions
Chapter 9: Sniffers
Understanding Sniffers
Using a Sniffer
Switched Network Sniffing
Exam Essentials
Summary
Review Questions
Chapter 10: Social Engineering
What Is Social Engineering?
What Is Social Networking?
Commonly Employed Threats
Identity Theft
Summary
Exam Essentials
Review Questions
Chapter 11: Denial of Service
Understanding DoS
Understanding DDoS
DoS Tools
DDoS Tools
DoS Defensive Strategies
DoS Pen Testing Considerations
Summary
Exam Essentials
Review Questions
Chapter 12: Session Hijacking
Understanding Session Hijacking
Exploring Defensive Strategies
Summary
Exam Essentials
Review Questions
Chapter 13: Web Servers and Web Applications
Exploring the Client-Server Relationship
Summary
Exam Essentials
Review Questions
Chapter 14: SQL Injection
Introducing SQL Injection
Summary
Exam Essentials
Review Questions
Chapter 15: Wireless Networking
What Is a Wireless Network?
Summary
Exam Essentials
Review Questions
Chapter 16: Evading IDSs, Firewalls, and Honeypots
Honeypots, IDSs, and Firewalls
Summary
Exam Essentials
Review Questions
Chapter 17: Physical Security
Introducing Physical Security
Summary
Exam Essentials
Review Questions
Appendix A: Answers to Review Questions
Appendix B: About the Additional Study Tools
Advertisement
End User License Agreement
List of Illustrations
FIGURE 1.1 Security versus convenience analysis
FIGURE 1.2 The hacking process
FIGURE 2.1 Bus topology
FIGURE 2.2 Ring topology
FIGURE 2.3 Star topology
FIGURE 2.4 Mesh topology
FIGURE 2.5 Hybrid topology
FIGURE 2.6 OSI TCP/IP comparative model
FIGURE 2.7 TCP three-way handshake
FIGURE 2.8 TCP sequencing
FIGURE 2.9 Residential network setup
FIGURE 2.10 Typical enterprise network
FIGURE 5.1 The three-way handshake
FIGURE 5.2 Half-open scan against closed and open ports
FIGURE 5.3 Xmas tree scan
FIGURE 5.4 An FIN scan against a closed port and an open port
FIGURE 5.5 A NULL scan against a closed and an open port
FIGURE 5.6 Results of a banner grab
FIGURE 5.7 A network map built by a network-mapping software package
FIGURE 8.1 JPS Virus Maker user interface
FIGURE 8.2 TCPView interface
FIGURE 9.1 TCP three-way handshake packet
FIGURE 9.2 Macof MAC flood
FIGURE 9.3 Cain and Abel
FIGURE 11.1 Basic program stack
FIGURE 11.2 Smashing the stack
FIGURE 11.3 Smashing the stack
FIGURE 12.1 Session hijack
FIGURE 12.2 Active attack
FIGURE 12.3 Passive attack
FIGURE 12.4 Spoofing
FIGURE 12.5 Source routing
FIGURE 12.6 Desynchronizing a connection
FIGURE 12.7 TCP three-way handshake
FIGURE 12.8 MITM attack
FIGURE 15.1 A Yagi antenna
FIGURE 15.2 A parabolic antenna
FIGURE 17.1 A drive degausser
FIGURE 17.2 A mantrap installed in a lobby
FIGURE 17.3 One kind of cipher lock
FIGURE 17.4 Lock-picking tools
List of Tables
TABLE 1.1 Available types of pen tests
TABLE 2.1 Hex, binary, and decimal
TABLE 2.2 Well-known ports
TABLE 2.3 Registered ports of interest
TABLE 3.1 Cracking times for 40- and 56-bit keys
TABLE 5.1 TCP flags
TABLE 5.2 Results of UDP scanning against closed and open ports
TABLE 5.3 Active vs. passive fingerprinting
TABLE 9.1 Wireshark filters
TABLE 9.2 Wireshark filter breakdown
TABLE 9.3 Wireshark CLI tools
TABLE 12.1 Dissected IDs
TABLE 15.1 Wireless standards
TABLE 15.2 Common wireless terms
Exercise 2.1 Finding the maC address
Exercise 4.1 Finding the IP Address of a Website
Exercise 4.2 Examining a Site
Exercise 7.1 Extracting Hashes from a System
Exercise 7.2 Creating Rainbow Tables
Exercise 7.3 Working with Rainbow Crack
Exercise 7.4 PSPV
Exercise 8.1 Creating a Simple Virus
Exercise 8.2 Using Netstat to Detect Open Ports
Exercise 8.3 Using TCPView to Track Port Usage
Exercise 9.1 Sniffing with Wireshark
Exercise 9.2 Sniffing with TCPdump
Exercise 9.3 Understanding Packet Analysis
Exercise 11.1 Performing a SYN Flood
Exercise 11.2 Seeing LOIC in Action
Exercise 12.1 Performing an MITM Attack
Exercise 13.1 Performing a Password Crack
Pages
iii
iv
v
vii
viii
xxi
xxii
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
xxxviii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
464
Guide
Cover
Table of Contents
Begin Reading