Example: tourism industry

CEHv8: Certified Ethical Hacker Version 8 Study Guide

222-07-2014 17:23:44 cehv8 Certified Ethical Hacker Version 8 Study 122-07-2014 17:23 222-07-2014 17:23:44 cehv8 Certified Ethical Hacker Version 8 Study GuideSean-Philip Oriyano 322-07-2014 17:23:44 Senior Acquisitions Editor: Jeff KellumDevelopment Editor: Richard MateosianTechnical Editors: Albert Whale and Robert BurkeProduction Editor: Dassi ZeidelCopy Editors: Liz Welch and Tiffany TaylorEditorial Manager: Pete GaughanVice President and Executive Group Publisher: Richard SwadleyAssociate Publisher: Chris WebbMedia Project Manager I: Laura Moss-HollisterMedia Associate Producer: Marilyn HummelMedia Quality Assurance: Doug KuhnBook Designer: Judy FungProofreader: Sarah Kaikini, Word One New YorkIndexer: Ted LauxProject Coordinator, Cover: Patrick RedmondCover Designer: WileyCover Image: Getty Images WoodhouseCopyright 2014 by John Wiley & Sons, Inc.

Thank you for choosing CEHv8: Certified Ethical Hacker Version 8 Study Guide. This This book is part of a family of premium-quality Sybex books, all of which are written by out-

Tags:

  Certified, Version, Ethical, Hacker, Cehv8, Certified ethical hacker version 8

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of CEHv8: Certified Ethical Hacker Version 8 Study Guide

1 222-07-2014 17:23:44 cehv8 Certified Ethical Hacker Version 8 Study 122-07-2014 17:23 222-07-2014 17:23:44 cehv8 Certified Ethical Hacker Version 8 Study GuideSean-Philip Oriyano 322-07-2014 17:23:44 Senior Acquisitions Editor: Jeff KellumDevelopment Editor: Richard MateosianTechnical Editors: Albert Whale and Robert BurkeProduction Editor: Dassi ZeidelCopy Editors: Liz Welch and Tiffany TaylorEditorial Manager: Pete GaughanVice President and Executive Group Publisher: Richard SwadleyAssociate Publisher: Chris WebbMedia Project Manager I: Laura Moss-HollisterMedia Associate Producer: Marilyn HummelMedia Quality Assurance: Doug KuhnBook Designer: Judy FungProofreader: Sarah Kaikini, Word One New YorkIndexer: Ted LauxProject Coordinator, Cover: Patrick RedmondCover Designer: WileyCover Image: Getty Images WoodhouseCopyright 2014 by John Wiley & Sons, Inc.

2 , Indianapolis, IndianaPublished simultaneously in CanadaISBN: 978-1-118- 64767-7 ISBN: 978-1-118-76332-2 (ebk.)ISBN: 978-1-118-98928-9 (ebk.)No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600.

3 Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warran-ties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation.

4 This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent pro-fessional person should be sought. Neither the publisher nor the author shall be liable for damages arising here-from. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the at (877) 762-2974, outside the at (317) 572-3993 or fax (317) publishes in a variety of print and electronic formats and by print-on-demand.

5 Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the Version you purchased, you may download this material at For more information about Wiley products, visit of Congress Control Number: : Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc.

6 Is not associated with any product or vendor mentioned in this 9 8 7 6 5 4 3 2 422-07-2014 17:23:44 Dear Reader,Thank you for choosing cehv8 : Certified Ethical Hacker Version 8 Study Guide . This book is part of a family of premium-quality Sybex books, all of which are written by out-standing authors who combine practical experience with a gift for was founded in 1976. More than 30 years later, we re still committed to producing consistently exceptional books. With each of our titles, we re working hard to set a new standard for the industry. From the paper we print on, to the authors we work with, our goal is to bring you the best books hope you see all that reflected in these pages.

7 I d be very interested to hear your comments and get your feedback on how we re doing. Feel free to let me know what you think about this or any other Sybex book by sending me an e-mail at contactus@sybex .com. If you think you ve found a technical error in this book, please visit http:sybex . Customer feedback is critical to our efforts at Sybex. Best regards, Chris Webb Associate Publisher Sybex, an Imprint of 522-07-2014 17:23 622-07-2014 17:23:44 AcknowledgmentsFirst, I would like to send a big thanks out to my mom for all her support over the years as without her I would not be where I am today. Thank you, Mom, and I love , thanks to my support network back in Alpha Company and my classmates.

8 All of you will eternally be my brothers and sisters, and it s this man s honor to serve with , thanks to my friend Jason McDowell. Your advice and input on some of the delicate topics of this book was a big to the copy editors, Liz Welch and Tiffany Taylor, and to the proofreader Sarah Kaikini at Word One, for all their hard , thanks to Jeff Kellum for your support and assistance in the making of this , Service, 722-07-2014 17:23:44 About the AuthorSean-Philip Oriyano is the owner of and a veteran of the IT field who has experience in the aerospace, defense, and cybersecurity industries. During his time in the industry, he has consulted and instructed on topics across the IT and cybersecurity fields for small clients up to the enterprise level.

9 Over the course of his career, he has worked with the military and Canadian armed forces and has taught at locations such as the Air Force Academy and the Naval War addition to his civilian career, Sean is a member of the California State Military Reserve, where he serves as a warrant officer specializing in networking and security. In this role, he works to support the Army and National Guard on technology issues and not working, he enjoys flying, traveling, skydiving, competing in obstacle races, and 822-07-2014 17:23:44 Contents at a GlanceIntroduction xxiAssessment Test xxxChapter 1 Getting Started with Ethical Hacking 1 Chapter 2 System Fundamentals 25 Chapter 3 Cryptography 55 Chapter 4 Footprinting and Reconnaissance 81 Chapter 5 Scanning Networks 103 Chapter 6 Enumeration of Services 127 Chapter 7 Gaining Access to a System 151 Chapter 8 Trojans, Viruses, Worms.

10 And Covert Channels 179 Chapter 9 Sniffers 209 Chapter 10 Social Engineering 235 Chapter 11 Denial of Service 259 Chapter 12 Session Hijacking 283 Chapter 13 Web Servers and Web Applications 309 Chapter 14 SQL Injection 329 Chapter 15 Wireless Networking 349 Chapter 16 Evading IDSs, Firewalls, and Honeypots 373 Chapter 17 Physical Security 393 Appendix A Answers to Review Questions 415 Appendix B About the Additional Study Tools 437 Index 922-07-2014 17:23 1022-07-2014 17:23:44 ContentsIntroduction xxiAssessment Test xxxChapter 1 Getting Started with Ethical Hacking 1 Hacking: A Short History 2 The Early Days of Hacking 2 Current Developments 3 Hacking: Fun or Criminal Activity?


Related search queries