The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
- The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope
- Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more
- Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking
- Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests
Part I The Business and Legal Issues of Ethical Hacking 1
Chapter 1 Introduction to Ethical Hacking 3
Chapter 2 Legality and Ethics 25
Chapter 3 Penetration Testing for Business 47
Part II The Pre-Attack Phases 71
Chapter 4 Footprinting 73
Chapter 5 Scanning 91
Chapter 6 Enumerating 117
Part III Attack Techniques and Tools 143
Chapter 7 System Hacking Techniques 145
Chapter 8 Trojans, Backdoors, and Sniffers 169
Chapter 9 Denial of Service Attacks and Session Hijacking 207
Chapter 10 Penetration Testing Steps 231
Chapter 11 Linux Hacking Tools 251
Chapter 12 Social Engineering and Physical Security 267
Part IV Web Server and Database Attacks 299
Chapter 13 Web Server Hacking and Web Application Vulnerabilities 301
Chapter 14 SQL Injection Vulnerabilities 327
Chapter 15 Cryptography 347
Chapter 16 Cracking Web Passwords 379
Part V Advanced Topics 399
Chapter 17 Wireless Network Attacks and Countermeasures 401
Chapter 18 Firewalls, Intrusion Detection Systems, and Honeypots 449
Chapter 19 Viruses, Worms, and Buffer Overflows 483
Appendix A Answers to Assessment Questions 499
Appendix B Glossary of Terms and Acronyms 625
Appendix C What’s on the CD 707
RUSSELL DEAN VINES, CISSP, CISM, Security +, CCNA, MCSE, MCNE, is Chief Security Advisor for Gotham Technology Group, LLC. He is the author or coauthor of numerous bestselling information system security publications, and is a consulting editor for John Wiley and Sons for its information security book series.
|Errata for Chapter 18
Corrected Chapter 18 pages 450-454, containing correct versions of Figures 18-1 through 8-4, are in the attached zip file.
|250.33 KB||Click to Download|
Do you think you've discovered an error in this book? Please check the list of errata below to see if we've already addressed the error. If not, please submit the error via our Errata Form. We will attempt to verify your error; if you're right, we will post a correction below.
|18||450-454||Chapter 18 errata
Zip file containing revised pages 450-454 of Chapter 18, replacing Figures 18-1 through 18-4 with correct versions. (Pages reflowed from originals.) File is located under Downloads.
|505||Error in Test Question
The correct answer to question 26, Chapter 1 should be "b", not "d."