CEH

(Jeff_L) #1

Exam Essentials 205


■ Nc -w [timeout]—Sets a timeout before Netcat automatically quits


■ Program | nc—Pipes program output to Netcat


■ Nc | program—Pipes Netcat output to a program


■ Nc -h—Displays help options


■ Nc -v—Puts Netcat into verbose mode


■ Nc -g or nc -G—Specifies source routing flags


■ Nc -t—Used for Telnet negotiation


■ Nc -o [file]—Hex-dumps traffic to a file


■ Nc -z—Used for port scanning


Summary


In this chapter, we covered one of the largest and most dangerous threats that has emerged
and evolved over the last 30 years: malware. You learned that malware is a blanket
term used to describe the family of software that includes viruses, worms, Trojans, and
logic bombs, as well as adware and spyware. Each of these types of malware has been
responsible for problems over the years and has done everything from being an annoyance
to causing outright harm. Malware collectively has evolved dramatically to now include the
ability to steal passwords, personal information, and identities in addition to being used in
countless other crimes.
You learned that although malware is a new term, the software types that it covers are
far from new. Viruses and worms are some of the oldest malicious software in existence.
But the power of this software has changed dramatically as hardware and software have
become more powerful and the bar to create malware has been lowered (thanks to readily
available tools). Exacerbating the problem is the fact that malware can be distributed
quickly, thanks to improved connectivity and faster distribution methods that are readily
available and accessible.


Exam Essentials


Understand the different types of malware. You must know the difference between
viruses, worms, and Trojans. Each has a unique way of functioning, and you must
understand these innate differences.


Know how to identify malware. Be aware of the signs of a malware attack.


Understand the flexible terminology. The topic of malware is presented on the exam in
many varied ways. Malware takes many forms, each of which has it own functions and
features.

Free download pdf