CEH
Malware 199 Tools for Creating Trojans A wide range of tools exist that are used to take control of a victim’s system and leave ...
200 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels An In-Depth Look at BO2K Whether you consider it a Trojan or a remo ...
Malware 201 In the next screen, enter a password that will be used to access the server. Note that passwords can be used, but y ...
202 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels ■ Trojan Man merges programs and can encrypt the new package in ord ...
Overt and Covert Channels 203 ■ Process-hiding backdoors—An attacker who wants to stay undetected for as long as possible typica ...
204 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels Some of the keystroke recorders include these: ■ IKS Software Keylo ...
Exam Essentials 205 ■ Nc -w [timeout]—Sets a timeout before Netcat automatically quits ■ Program | nc—Pipes program output to Ne ...
206 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels Review Questions Which statement defines malware most accurately? ...
Review Questions 207 Which utility will tell you in real time which ports are listening or in another state? A. Netstat B. TCP ...
208 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels An overt channel is. A. An obvious method of using a system B. A d ...
Sniffers CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER: ✓ II. Analysis/Assessment ■ A. Data analysis ✓ IV. Tools/Systems/Programs ...
Sniffing allows you to see all sorts of traffic, both protected and unprotected. In the right conditions and with the right prot ...
Understanding Sniffers 211 When on a switched network, your traffic capture is limited to the seg- ment you are connected to reg ...
212 Chapter 9 ■ Sniffers How successful sniffers are depends on the relative and inherent insecurity of certain network protocol ...
Using a Sniffer 213 In terms of LI, typically the sniffing process is looked at as having three components. The first component ...
214 Chapter 9 ■ Sniffers Wireshark As of this writing, Wireshark reigns supreme as perhaps the best sniffer on the market. Wires ...
Using a Sniffer 215 Choose Capture ➢ Interfaces to open the window shown here. This step is identical on Linux and Windows vers ...
216 Chapter 9 ■ Sniffers You have several options for generating traffic. Remember that a wireless connection (802.11) works as ...
Using a Sniffer 217 Table 9.1 lists the basic filters that you will most likely use (and may see on the exam). As you review the ...
218 Chapter 9 ■ Sniffers Wireshark command-line tools are important, but for the exam focus on learning the interface; memorizin ...
«
8
9
10
11
12
13
14
15
16
17
»
Free download pdf