14.11.2012 Views

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Understand The Freedom of Information Act 5 U.S.C. § 552<br />

• Understand Federal Information Security Management Act (FISMA)<br />

• Understand The Privacy Act Of 1974 5 U.S.C. § 552a<br />

• Understand USA Patriot Act of 2001<br />

Footprinting<br />

• Defi ne the term Footprinting<br />

• Describe information gathering methodology<br />

• Describe competitive intelligence<br />

• Understand DNS enumeration<br />

• Understand Whois, ARIN lookup<br />

• Identify different types of DNS records<br />

• Understand how traceroute is used in Footprinting<br />

• Understand how e-mail tracking works<br />

• Understand how web spiders work<br />

Google Hacking<br />

• Defi ne Google hacking<br />

• What a hacker can do with vulnerable site<br />

• How to use Google as a Proxy Server<br />

• What is Google Hacking Database (GHDB)<br />

• Understand Traversal Techniques<br />

Scanning<br />

• Defi ne the term port scanning, network scanning and vulnerability scanning<br />

http://www.eccouncil.org<br />

EC-Council<br />

Page 193

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!