Skip to main content

English

Published by Pearson IT Certification (May 25, 2022) © 2022

William Easttom
    VitalSource eTextbook ( Lifetime access )
    €30,99
    ISBN-13: 9780137513581

    Certified Ethical Hacker (CEH) Exam Cram ,1st edition

    Access details

    • Instant access once purchased
    • Fulfilled by VitalSource

    Features

    • Add notes and highlights
    • Search by keyword or page

    Language: English

    Product Information

    Certified Ethical Hacker (CEH) Exam Cram is the perfect study guide to help you pass the updated CEH Version 11 exam. Its expert real-world approach reflects Dr. Chuck Easttom's expertise as one of the world's leading cybersecurity practitioners and instructors, plus test-taking insights he has gained from teaching CEH preparation courses worldwide. Easttom assumes no prior knowledge: His expert coverage of every exam topic can help readers with little ethical hacking experience to obtain the knowledge to succeed.


    This guide's extensive preparation tools include topic overviews, exam alerts, CramSavers, CramQuizzes, chapter-ending review questions, author notes and tips, an extensive glossary, and the handy CramSheet tear-out: key facts in an easy-to-review format. (This eBook edition of Certified Ethical Hacker (CEH) Exam Cram does not include access to the companion website with practice exam(s) included with the print or Premium edition.)


    Certified Ethical Hacker (CEH) Exam Cram helps you master all topics on CEH Exam Version 11:


    • Review the core principles and concepts of ethical hacking
    • Perform key pre-attack tasks, including reconnaissance and footprinting
    • Master enumeration, vulnerability scanning, and vulnerability analysis
    • Learn system hacking methodologies, how to cover your tracks, and more
    • Utilize modern malware threats, including ransomware and financial malware
    • Exploit packet sniffing and social engineering
    • Master denial of service and session hacking attacks, tools, and countermeasures
    • Evade security measures, including IDS, firewalls, and honeypots
    • Hack web servers and applications, and perform SQL injection attacks
    • Compromise wireless and mobile systems, from wireless encryption to recent Android exploits
    • Hack Internet of Things (IoT) and Operational Technology (OT) devices and systems
    • Attack cloud computing systems, misconfigurations, and containers
    • Use cryptanalysis tools and attack cryptographic systems

        Introduction. . . . . . . . . . . . . . . . . . . . . . . xx

    CHAPTER 1:

        Reconnaissance and Scanning.. . . . . . . . . . . . . . . . . 1

        Reconnaissance Types.. . . . . . . . . . . . . . . . . . 1

        Active Reconnaissance Techniques. . . . . . . . . . . . . . 22

        What Next?.. . . . . . . . . . . . . . . . . . . . . 32

    CHAPTER 2:

        Enumeration and Vulnerability Scanning.. . . . . . . . . . . . . 33

        Scanning.. . . . . . . . . . . . . . . . . . . . . . 33

        Scanning Process.. . . . . . . . . . . . . . . . . . . 43

        Network Packet Capture.. . . . . . . . . . . . . . . . . 52

        Vulnerability Scanning. . . . . . . . . . . . . . . . . . 57

        What Next?.. . . . . . . . . . . . . . . . . . . . . 63

    CHAPTER 3:

        System Hacking. . . . . . . . . . . . . . . . . . . . . . 65

        CEH Methodology.. . . . . . . . . . . . . . . . . . . 65

        Pass the Hash.. . . . . . . . . . . . . . . . . . . . . 73

        Spyware. . . . . . . . . . . . . . . . . . . . . . . 79

        What Next?.. . . . . . . . . . . . . . . . . . . . . 92

    CHAPTER 4:

        Malware.. . . . . . . . . . . . . . . . . . . . . . . . 93

        Malware Types.. . . . . . . . . . . . . . . . . . . . 94

        Viruses. . . . . . . . . . . . . . . . . . . . . . . 108

        Protecting Against Malware.. . . . . . . . . . . . . . . . 115

        What Next?.. . . . . . . . . . . . . . . . . . . . . 122

    CHAPTER 5:

        Packet Sniffing and Social Engineering.. . . . . . . . . . . . . 123

        Social Engineering.. . . . . . . . . . . . . . . . . . . 123

        Packet Sniffing.. . . . . . . . . . . . . . . . . . . . 138

        What Next?.. . . . . . . . . . . . . . . . . . . . . 150

    CHAPTER 6:

        Denial of Service and Session Hijacking.. . . . . . . . . . . . . 151

        Denial of Service. . . . . . . . . . . . . . . . . . . . 151

        Session Hijacking.. . . . . . . . . . . . . . . . . . . 165

        What Next?.. . . . . . . . . . . . . . . . . . . . . 172

    CHAPTER 7:

        Evading Security Measures. . . . . . . . . . . . . . . . . . 173

        Intrusion Detection Systems. . . . . . . . . . . . . . . . 173

        Firewalls and Honeypots.. . . . . . . . . . . . . . . . . 183

        Virtual Private Networks.. . . . . . . . . . . . . . . . . 189

        IDS Evasion Techniques.. . . . . . . . . . . . . . . . . 192

        Firewall Evasion Techniques. . . . . . . . . . . . . . . . 198

        What Next?.. . . . . . . . . . . . . . . . . . . . . 204

    CHAPTER 8:

        Hacking Web Servers and Web Applications.. . . . . . . . . . . 205

        Web Servers.. . . . . . . . . . . . . . . . . . . . . 205

        Web Applications.. . . . . . . . . . . . . . . . . . . 214

        What Next?.. . . . . . . . . . . . . . . . . . . . . 232

    CHAPTER 9:

        Hacking Wireless.. . . . . . . . . . . . . . . . . . . . . 233

        Wireless Technology.. . . . . . . . . . . . . . . . . . 233

        Hacking Wireless.. . . . . . . . . . . . . . . . . . . 245

        What Next?.. . . . . . . . . . . . . . . . . . . . . 258

    CHAPTER 10:

        Hacking Mobile.. . . . . . . . . . . . . . . . . . . . . . 259

        Mobile Technologies.. . . . . . . . . . . . . . . . . . 259

        Mobile Threats. . . . . . . . . . . . . . . . . . . . 274

        What Next?.. . . . . . . . . . . . . . . . . . . . . 282

    CHAPTER 11:

        IOT and OT Hacking. . . . . . . . . . . . . . . . . . . . 283

        IoT Fundamentals. . . . . . . . . . . . . . . . . . . 283

        What Next?.. . . . . . . . . . . . . . . . . . . . . 308

    CHAPTER 12:

        Cloud Computing and Hacking.. . . . . . . . . . . . . . . . 309

        Cloud Fundamentals.. . . . . . . . . . . . . . . . . . 309

        What Next?.. . . . . . . . . . . . . . . . . . . . . 331

    CHAPTER 13:

        Cryptography. . . . . . . . . . . . . . . . . . . . . . . 333

        Cryptography Concepts.. . . . . . . . . . . . . . . . . 333

        PKI. . . . . . . . . . . . . . . . . . . . . . . . 349

        Cryptographic Attacks.. . . . . . . . . . . . . . . . . . 357

        What Next?.. . . . . . . . . . . . . . . . . . . . . 365

    Glossary.. . . . . . . . . . . . . . . . . . . . . . . . 367

    Index. . . . . . . . . . . . . . . . . . . . . . . . . . 391





    12/7/2021, TOC, 978137513444


    Top