CEH
What Is an Ethical Hacker? 19 with your input, the contract must be put in place. Remember the following points when developing ...
20 Chapter 1 ■ Getting Started with Ethical Hacking Summary When becoming an ethical hacker, you must develop a rich and diverse ...
Review Questions 21 Review Questions If you have been contracted to perform an attack against a target system, you are what typ ...
22 Chapter 1 ■ Getting Started with Ethical Hacking Which of the following is the purpose of the footprinting process? A. Enter ...
Review Questions 23 Which type of hacker may use their skills for both benign and malicious goals at different times? A. White ...
24 Chapter 1 ■ Getting Started with Ethical Hacking What does TOE stand for? A. Target of evaluation B. Time of evaluation C. T ...
System Fundamentals CEH Exam objECtivES C ovErEd in tHiS CHaptEr: ✓ I. Background A. Networking technologies C. System technolog ...
Every skill set comes with a history of time and effort spent learning those foundational concepts that allow you to become prof ...
Exploring Network Topologies 27 FigurE 2.1 Bus topology Data Bus burns out or is removed. Although not seen in its purest form i ...
28 Chapter 2 ■ System Fundamentals FigurE 2.3 Star topology FigurE 2.2 Ring topology Ring To pology ...
Exploring Network Topologies 29 Mesh A mesh topology (Figure 2.4) is essentially a web of cabling that attaches a group of clien ...
30 Chapter 2 ■ System Fundamentals Working with the Open Systems Interconnection Model No network discussion or network device e ...
Working with the Open Systems Interconnection Model 31 The OSI model, shown in the left side of Figure 2.6, has seven layers. As ...
32 Chapter 2 ■ System Fundamentals Stuxnet A few years ago an interesting little worm named Stuxnet showed up on the scene—wreak ...
Dissecting the TCP/IP Suite 33 Two mnemonics that I use to remember the order of layers are: ■ All People Seem To Need Data Proc ...
34 Chapter 2 ■ System Fundamentals FigurE 2.7 TCP three-way handshake Sending System Receiving System System 2 System 2 ACK Syst ...
Hexadecimal vs. Binary 35 You’ll want to become comfortable with TCP and its three-way handshake process. The surface-level proc ...
36 Chapter 2 ■ System Fundamentals tablE 2.1 Hex, binary, and decimal Hex Binary Decimal 0 0000 0 1 0001 1 2 0010 2 3 0 011 3 4 ...
Exploring TCP/IP Ports 37 Exploring TCP/IP Ports We can’t let you escape the fundamentals without touching on ports. Ports allow ...
38 Chapter 2 ■ System Fundamentals Port Use 88 Kerberos 110 POP3 111 Portmapper - Linux 123 NTP 135 RPC-DCOM 139 SMB 143 IMAP 16 ...
«
1
2
3
4
5
6
7
8
9
10
»
Free download pdf