Skip to main content

The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking

The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking

Ronald L. Krutz, Russell Dean Vines

ISBN: 978-0-470-23138-8

Jul 2007

738 pages

Select type: E-Book

Product not available for purchase

Description

  • The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope
  • Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more
  • Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking
  • Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests

Related Resources

Instructor

Request an Evaluation Copy for this title

Foreword xxiii

Acknowledgments xxv

Introduction xxvii

Part I The Business and Legal Issues of Ethical Hacking 1

Chapter 1 Introduction to Ethical Hacking 3

Chapter 2 Legality and Ethics 25

Chapter 3 Penetration Testing for Business 47

Part II The Pre-Attack Phases 71

Chapter 4 Footprinting 73

Chapter 5 Scanning 91

Chapter 6 Enumerating 117

Part III Attack Techniques and Tools 143

Chapter 7 System Hacking Techniques 145

Chapter 8 Trojans, Backdoors, and Sniffers 169

Chapter 9 Denial of Service Attacks and Session Hijacking 207

Chapter 10 Penetration Testing Steps 231

Chapter 11 Linux Hacking Tools 251

Chapter 12 Social Engineering and Physical Security 267

Part IV Web Server and Database Attacks 299

Chapter 13 Web Server Hacking and Web Application Vulnerabilities 301

Chapter 14 SQL Injection Vulnerabilities 327

Chapter 15 Cryptography 347

Chapter 16 Cracking Web Passwords 379

Part V Advanced Topics 399

Chapter 17 Wireless Network Attacks and Countermeasures 401

Chapter 18 Firewalls, Intrusion Detection Systems, and Honeypots 449

Chapter 19 Viruses, Worms, and Buffer Overflows 483

Appendix A Answers to Assessment Questions 499

Appendix B Glossary of Terms and Acronyms 625

Appendix C What’s on the CD 707

Index 711

Errata for Chapter 18
Corrected Chapter 18 pages 450-454, containing correct versions of Figures 18-1 through 8-4, are in the attached zip file.
Download
ChapterPageDetailsDatePrint Run
18450-454Chapter 18 errata
Zip file containing revised pages 450-454 of Chapter 18, replacing Figures 18-1 through 18-4 with correct versions. (Pages reflowed from originals.) File is located under Downloads.
11/9/071st

505Error in Test Question
The correct answer to question 26, Chapter 1 should be "b", not "d."
05/04/2008