The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
Ronald L. Krutz, Russell Dean Vines
- The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope
- Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more
- Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking
- Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests
Table of Contents
The Business and Legal Issues of Ethical Hacking.
Introduction to Hacking.
Ethics and Legality.
Penetration Testing for Business.
The Pre-Attack Phases.
Attack Techniques and Tools.
System Hacking Techniques.
Trojans, Backdoors and Sniffers.
Denial of Service Attacks and Session Hijacking.
Penetration Testing Steps.
Linux Hacking Tools.
Social Engineering and Physical Security.
Web Server and Database Attacks.
Web Server Hacking and Web Application Vulnerabilities.
SQL Injection Vulnerabilities.
Cracking Web Passwords.
Wireless Network Attacks and Countermeasures.
Firewalls, Intrusion Detection Systems and Honeypots.
Viruses, Worms and Buffer Overflows.
Answers to Sample Questions.
Glossary of Terms and Acronyms.
What's on the CD.