Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Contents
Title
Copyright
Acknowledgments
About the Author
Table of Exercises
Introduction
Assessment Test
Chapter 1: Getting Started with Ethical Hacking
Hacking: A Short History
What Is an Ethical Hacker?
Summary
Exam Essentials
Review Questions
Chapter 2: System Fundamentals
Exploring Network Topologies
Working with the Open Systems Interconnection Model
Dissecting the TCP/IP Suite
IP Subnetting
Hexadecimal vs. Binary
Exploring TCP/IP Ports
Understanding Network Devices
Working with MAC Addresses
Intrusion Prevention and Intrusion Detection Systems
Network Security
Knowing Operating Systems
Backups and Archiving
Summary
Exam Essentials
Review Questions
Chapter 3: Cryptography
Cryptography: Early Applications and Examples
Cryptography in Action
Understanding Hashing
Issues with Cryptography
Applications of Cryptography
Summary
Exam Essentials
Review Questions
Chapter 4: Footprinting and Reconnaissance
Understanding the Steps of Ethical Hacking
What Is Footprinting?
Terminology in Footprinting
Threats Introduced by Footprinting
The Footprinting Process
Summary
Exam Essentials
Review Questions
Chapter 5: Scanning Networks
What Is Network Scanning?
Checking for Live Systems
Checking for Open Ports
Types of Scans
OS Fingerprinting
Banner Grabbing
Countermeasures
Vulnerability Scanning
Drawing Network Diagrams
Using Proxies
Summary
Exam Essentials
Review Questions
Chapter 6: Enumeration of Services
A Quick Review
What Is Enumeration?
Windows Basics
Enumeration with SNMP
Unix and Linux Enumeration
LDAP and Directory Service Enumeration
Enumeration Using NTP
SMTP Enumeration
Using EXPN
Using RCPT TO
SMTP Relay
Summary
Exam Essentials
Review Questions
Chapter 7: Gaining Access to a System
Up to This Point
Summary
Exam Essentials
Review Questions
Chapter 8: Trojans, Viruses, Worms, and Covert Channels
Malware
Overt and Covert Channels
Summary
Exam Essentials
Review Questions
Chapter 9: Sniffers
Understanding Sniffers
Using a Sniffer
Switched Network Sniffing
Exam Essentials
Summary
Review Questions
Chapter 10: Social Engineering
What Is Social Engineering?
What Is Social Networking?
Commonly Employed Threats
Identity Theft
Summary
Exam Essentials
Review Questions
Chapter 11: Denial of Service
Understanding DoS
Understanding DDoS
DoS Tools
DDoS Tools
DoS Defensive Strategies
DoS Pen Testing Considerations
Summary
Exam Essentials
Review Questions
Chapter 12: Session Hijacking
Understanding Session Hijacking
Exploring Defensive Strategies
Summary
Exam Essentials
Review Questions
Chapter 13: Web Servers and Web Applications
Exploring the Client-Server Relationship
Summary
Exam Essentials
Review Questions
Chapter 14: SQL Injection
Introducing SQL Injection
Summary
Exam Essentials
Review Questions
Chapter 15: Wireless Networking
What Is a Wireless Network?
Summary
Exam Essentials
Review Questions
Chapter 16: Evading IDSs, Firewalls, and Honeypots
Honeypots, IDSs, and Firewalls
Summary
Exam Essentials
Review Questions
Chapter 17: Physical Security
Introducing Physical Security
Summary
Exam Essentials
Review Questions
Appendix A: Answers to Review Questions
Appendix B: About the Additional Study Tools
Advertisement
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →