14.11.2012 Views

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hacking Email Accounts<br />

• What are the different ways to get information of email account<br />

• What do you understand by cookie stealing<br />

• Understand password phishing<br />

• Email security<br />

Denial-of-Service<br />

• Understand the types of DoS Attacks<br />

• Understand how DDoS attack works<br />

• Understand how BOTs/BOTNETS work<br />

• What is “smurf ” attack<br />

• What is “SYN” fl ooding<br />

• Describe the DoS/DDoS countermeasures<br />

Session Hijacking<br />

• Understand Spoofi ng vs. Hijacking<br />

• List the types of Session Hijacking<br />

• Understand Sequence Prediction<br />

• What are the steps in performing session hijacking<br />

• Describe how you would prevent session hijacking<br />

Hacking Web Servers<br />

• List the types of web server vulnerabilities<br />

• Understand the attacks Against Web Servers<br />

• Understand IIS Unicode exploits<br />

http://www.eccouncil.org<br />

EC-Council<br />

Page 197

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!