- Page 3:
CEHv8 Certified Ethical Hacker Vers
- Page 6 and 7:
Senior Acquisitions Editor: Jeff Ke
- Page 9 and 10:
Acknowledgments First, I would like
- Page 11:
Contents at a Glance Introduction A
- Page 14 and 15:
xii Contents Chapter 3 Cryptography
- Page 16 and 17:
xiv Contents Commonly Exploited Ser
- Page 18 and 19:
xvi Contents Chapter 11 Denial of S
- Page 20 and 21:
xviii Contents Securing the Physica
- Page 23 and 24:
Introduction If you’re preparing
- Page 25 and 26:
Introduction xxiii How to Become a
- Page 27 and 28:
Introduction xxv Tips for Taking th
- Page 29 and 30:
Introduction xxvii 4. Answer all of
- Page 31 and 32:
Introduction xxix Network/wireless
- Page 33 and 34:
Assessment Test xxxi C. PPP D. SLIP
- Page 35 and 36:
Assessment Test xxxiii 19. An indiv
- Page 37 and 38:
Assessment Test xxxv 31. Which of t
- Page 39 and 40:
Answers to Assessment Test xxxvii 1
- Page 41:
CEHv8 Certified Ethical Hacker Vers
- Page 44 and 45:
In this book you will learn the var
- Page 46 and 47:
4 Chapter 1 ■ Getting Started wit
- Page 48 and 49:
6 Chapter 1 ■ Getting Started wit
- Page 50 and 51:
8 Chapter 1 ■ Getting Started wit
- Page 52 and 53:
10 Chapter 1 ■ Getting Started wi
- Page 54 and 55:
12 Chapter 1 ■ Getting Started wi
- Page 56 and 57:
14 Chapter 1 ■ Getting Started wi
- Page 58 and 59:
16 Chapter 1 ■ Getting Started wi
- Page 60 and 61:
18 Chapter 1 ■ Getting Started wi
- Page 62 and 63:
20 Chapter 1 ■ Getting Started wi
- Page 64 and 65:
22 Chapter 1 ■ Getting Started wi
- Page 66 and 67:
24 Chapter 1 ■ Getting Started wi
- Page 68 and 69:
Every skill set comes with a histor
- Page 70 and 71:
28 Chapter 2 ■ System Fundamental
- Page 72 and 73:
30 Chapter 2 ■ System Fundamental
- Page 74 and 75:
32 Chapter 2 ■ System Fundamental
- Page 76 and 77:
34 Chapter 2 ■ System Fundamental
- Page 78 and 79:
36 Chapter 2 ■ System Fundamental
- Page 80 and 81:
38 Chapter 2 ■ System Fundamental
- Page 82 and 83:
40 Chapter 2 ■ System Fundamental
- Page 84 and 85:
42 Chapter 2 ■ System Fundamental
- Page 86 and 87:
44 Chapter 2 ■ System Fundamental
- Page 88 and 89:
46 Chapter 2 ■ System Fundamental
- Page 90 and 91:
48 Chapter 2 ■ System Fundamental
- Page 92 and 93:
50 Chapter 2 ■ System Fundamental
- Page 94 and 95:
52 Chapter 2 ■ System Fundamental
- Page 96 and 97:
54 Chapter 2 ■ System Fundamental
- Page 98 and 99:
This chapter covers cryptography, a
- Page 100 and 101:
58 Chapter 3 ■ Cryptography The p
- Page 102 and 103:
60 Chapter 3 ■ Cryptography ■
- Page 104 and 105:
62 Chapter 3 ■ Cryptography MARS
- Page 106 and 107:
64 Chapter 3 ■ Cryptography A has
- Page 108 and 109:
66 Chapter 3 ■ Cryptography The C
- Page 110 and 111:
68 Chapter 3 ■ Cryptography Under
- Page 112 and 113:
70 Chapter 3 ■ Cryptography TABLE
- Page 114 and 115:
72 Chapter 3 ■ Cryptography 5. On
- Page 116 and 117:
74 Chapter 3 ■ Cryptography PGP w
- Page 118 and 119:
76 Chapter 3 ■ Cryptography Revie
- Page 120 and 121:
78 Chapter 3 ■ Cryptography 13. W
- Page 123 and 124:
Chapter 4 Footprinting and Reconnai
- Page 125 and 126:
Understanding the Steps of Ethical
- Page 127 and 128:
What Is Footprinting? 85 Goals of t
- Page 129 and 130:
Terminology in Footprinting 87 Orga
- Page 131 and 132:
The Footprinting Process 89 Using S
- Page 133 and 134:
The Footprinting Process 91 Locatio
- Page 135 and 136:
The Footprinting Process 93 will no
- Page 137 and 138:
The Footprinting Process 95 In secu
- Page 139 and 140:
Exam Essentials 97 I want to introd
- Page 141 and 142:
Review Questions 99 7. Which of the
- Page 143:
Review Questions 101 19. Footprinti
- Page 146 and 147:
Once you’ve completed the footpri
- Page 148 and 149:
106 Chapter 5 ■ Scanning Networks
- Page 150 and 151:
108 Chapter 5 ■ Scanning Networks
- Page 152 and 153:
110 Chapter 5 ■ Scanning Networks
- Page 154 and 155:
112 Chapter 5 ■ Scanning Networks
- Page 156 and 157:
114 Chapter 5 ■ Scanning Networks
- Page 158 and 159:
116 Chapter 5 ■ Scanning Networks
- Page 160 and 161:
118 Chapter 5 ■ Scanning Networks
- Page 162 and 163:
120 Chapter 5 ■ Scanning Networks
- Page 164 and 165:
122 Chapter 5 ■ Scanning Networks
- Page 166 and 167:
124 Chapter 5 ■ Scanning Networks
- Page 168 and 169:
126 Chapter 5 ■ Scanning Networks
- Page 170 and 171:
You’ve gathered a lot of informat
- Page 172 and 173:
130 Chapter 6 ■ Enumeration of Se
- Page 174 and 175:
132 Chapter 6 ■ Enumeration of Se
- Page 176 and 177:
134 Chapter 6 ■ Enumeration of Se
- Page 178 and 179:
136 Chapter 6 ■ Enumeration of Se
- Page 180 and 181:
138 Chapter 6 ■ Enumeration of Se
- Page 182 and 183:
140 Chapter 6 ■ Enumeration of Se
- Page 184 and 185:
142 Chapter 6 ■ Enumeration of Se
- Page 186 and 187:
144 Chapter 6 ■ Enumeration of Se
- Page 188 and 189:
146 Chapter 6 ■ Enumeration of Se
- Page 190 and 191:
148 Chapter 6 ■ Enumeration of Se
- Page 192 and 193:
150 Chapter 6 ■ Enumeration of Se
- Page 194 and 195:
Using the information gathered so f
- Page 196 and 197:
154 Chapter 7 ■ Gaining Access to
- Page 198 and 199:
156 Chapter 7 ■ Gaining Access to
- Page 200 and 201:
158 Chapter 7 ■ Gaining Access to
- Page 202 and 203:
160 Chapter 7 ■ Gaining Access to
- Page 204 and 205:
162 Chapter 7 ■ Gaining Access to
- Page 206 and 207:
164 Chapter 7 ■ Gaining Access to
- Page 208 and 209:
166 Chapter 7 ■ Gaining Access to
- Page 210 and 211:
168 Chapter 7 ■ Gaining Access to
- Page 212 and 213:
170 Chapter 7 ■ Gaining Access to
- Page 214 and 215:
172 Chapter 7 ■ Gaining Access to
- Page 216 and 217:
174 Chapter 7 ■ Gaining Access to
- Page 218 and 219:
176 Chapter 7 ■ Gaining Access to
- Page 221 and 222:
Chapter 8 Trojans, Viruses, Worms,
- Page 223 and 224:
Malware 181 In past decades, what w
- Page 225 and 226:
Malware 183 The Patriot Act This ac
- Page 227 and 228:
Malware 185 1. Design. The author e
- Page 229 and 230:
Malware 187 ■ ■ Macro viruses d
- Page 231 and 232:
Malware 189 How to Create a Virus C
- Page 233 and 234:
Malware 191 A Closer Look at Slamme
- Page 235 and 236:
Malware 193 ■ ■ Freeware—Down
- Page 237 and 238:
Malware 195 Operations that could b
- Page 239 and 240:
Malware 197 ■ NetMeeting Remote:
- Page 241 and 242:
Malware 199 Tools for Creating Troj
- Page 243 and 244:
Malware 201 5. In the next screen,
- Page 245 and 246:
Overt and Covert Channels 203 ■ P
- Page 247 and 248:
Exam Essentials 205 ■ ■ ■ ■
- Page 249 and 250: Review Questions 207 7. Which utili
- Page 251 and 252: Chapter 9 Sniffers CEH EXAM OBJECTI
- Page 253 and 254: Understanding Sniffers 211 When on
- Page 255 and 256: Using a Sniffer 213 In terms of LI,
- Page 257 and 258: Using a Sniffer 215 2. Choose Captu
- Page 259 and 260: Using a Sniffer 217 Table 9.1 lists
- Page 261 and 262: Using a Sniffer 219 2. Next you nee
- Page 263 and 264: Using a Sniffer 221 output from a s
- Page 265 and 266: Using a Sniffer 223 3. Select the T
- Page 267 and 268: Switched Network Sniffing 225 What
- Page 269 and 270: Switched Network Sniffing 227 Port
- Page 271 and 272: Switched Network Sniffing 229 root@
- Page 273 and 274: Review Questions 231 Review Questio
- Page 275 and 276: Review Questions 233 13. What is th
- Page 277 and 278: Chapter 10 Social Engineering CEH E
- Page 279 and 280: What Is Social Engineering? 237 If
- Page 281 and 282: What Is Social Engineering? 239 eng
- Page 283 and 284: What Is Social Networking? 241 Many
- Page 285 and 286: What Is Social Networking? 243 Mist
- Page 287 and 288: What Is Social Networking? 245 Ambe
- Page 289 and 290: Commonly Employed Threats 247 Dumps
- Page 291 and 292: Commonly Employed Threats 249 ■
- Page 293 and 294: Identity Theft 251 Although some si
- Page 295 and 296: Exam Essentials 253 Know about tech
- Page 297 and 298: Review Questions 255 7. Phishing ca
- Page 299: Review Questions 257 19. An attacke
- Page 303 and 304: Understanding DoS 261 Typical victi
- Page 305 and 306: Understanding DoS 263 phone over an
- Page 307 and 308: Understanding DoS 265 1. You’ll m
- Page 309 and 310: Understanding DoS 267 Buffer Overfl
- Page 311 and 312: Understanding DoS 269 The key takea
- Page 313 and 314: Understanding DDoS 271 ■ ■ The
- Page 315 and 316: DDoS Tools 273 Tools for Creating B
- Page 317 and 318: DDoS Tools 275 4. Now that you have
- Page 319 and 320: Summary 277 Degrading Services In t
- Page 321 and 322: Review Questions 279 Review Questio
- Page 323 and 324: Review Questions 281 12. While moni
- Page 325 and 326: Chapter 12 Session Hijacking CEH EX
- Page 327 and 328: Understanding Session Hijacking 285
- Page 329 and 330: Understanding Session Hijacking 287
- Page 331 and 332: Understanding Session Hijacking 289
- Page 333 and 334: Understanding Session Hijacking 291
- Page 335 and 336: Understanding Session Hijacking 293
- Page 337 and 338: Understanding Session Hijacking 295
- Page 339 and 340: Understanding Session Hijacking 297
- Page 341 and 342: Understanding Session Hijacking 299
- Page 343 and 344: Understanding Session Hijacking 301
- Page 345 and 346: Exam Essentials 303 importance of u
- Page 347 and 348: Review Questions 305 A. Session spl
- Page 349: Review Questions 307 15. XSS is typ
- Page 352 and 353:
A web application is an application
- Page 354 and 355:
312 Chapter 13 ■ Web Servers and
- Page 356 and 357:
314 Chapter 13 ■ Web Servers and
- Page 358 and 359:
316 Chapter 13 ■ Web Servers and
- Page 360 and 361:
318 Chapter 13 ■ Web Servers and
- Page 362 and 363:
320 Chapter 13 ■ Web Servers and
- Page 364 and 365:
322 Chapter 13 ■ Web Servers and
- Page 366 and 367:
324 Chapter 13 ■ Web Servers and
- Page 368 and 369:
326 Chapter 13 ■ Web Servers and
- Page 371 and 372:
Chapter 14 SQL Injection CEH EXAM O
- Page 373 and 374:
Introducing SQL Injection 331 In th
- Page 375 and 376:
Introducing SQL Injection 333 ■
- Page 377 and 378:
Introducing SQL Injection 335 Recor
- Page 379 and 380:
Introducing SQL Injection 337 inurl
- Page 381 and 382:
Introducing SQL Injection 339 To ge
- Page 383 and 384:
Introducing SQL Injection 341 Let
- Page 385 and 386:
Introducing SQL Injection 343 ■
- Page 387 and 388:
Review Questions 345 Review Questio
- Page 389:
Review Questions 347 14. Which comm
- Page 392 and 393:
Wireless networks have been popular
- Page 394 and 395:
352 Chapter 15 ■ Wireless Network
- Page 396 and 397:
354 Chapter 15 ■ Wireless Network
- Page 398 and 399:
356 Chapter 15 ■ Wireless Network
- Page 400 and 401:
358 Chapter 15 ■ Wireless Network
- Page 402 and 403:
360 Chapter 15 ■ Wireless Network
- Page 404 and 405:
362 Chapter 15 ■ Wireless Network
- Page 406 and 407:
364 Chapter 15 ■ Wireless Network
- Page 408 and 409:
366 Chapter 15 ■ Wireless Network
- Page 410 and 411:
368 Chapter 15 ■ Wireless Network
- Page 412 and 413:
370 Chapter 15 ■ Wireless Network
- Page 415 and 416:
Chapter 16 Evading IDSs, Firewalls,
- Page 417 and 418:
Honeypots, IDSs, and Firewalls 375
- Page 419 and 420:
Honeypots, IDSs, and Firewalls 377
- Page 421 and 422:
Honeypots, IDSs, and Firewalls 379
- Page 423 and 424:
Honeypots, IDSs, and Firewalls 381
- Page 425 and 426:
Honeypots, IDSs, and Firewalls 383
- Page 427 and 428:
Honeypots, IDSs, and Firewalls 385
- Page 429 and 430:
Honeypots, IDSs, and Firewalls 387
- Page 431 and 432:
Review Questions 389 Review Questio
- Page 433:
Review Questions 391 14. SMTP is us
- Page 436 and 437:
Working with all the technical and
- Page 438 and 439:
396 Chapter 17 ■ Physical Securit
- Page 440 and 441:
398 Chapter 17 ■ Physical Securit
- Page 442 and 443:
400 Chapter 17 ■ Physical Securit
- Page 444 and 445:
402 Chapter 17 ■ Physical Securit
- Page 446 and 447:
404 Chapter 17 ■ Physical Securit
- Page 448 and 449:
406 Chapter 17 ■ Physical Securit
- Page 450 and 451:
408 Chapter 17 ■ Physical Securit
- Page 452 and 453:
410 Chapter 17 ■ Physical Securit
- Page 454 and 455:
412 Chapter 17 ■ Physical Securit
- Page 457 and 458:
Appendix A Answers to Review Questi
- Page 459 and 460:
Chapter 2: System Fundamentals 417
- Page 461 and 462:
Chapter 4: Footprinting and Reconna
- Page 463 and 464:
Chapter 5: Scanning Networks 421 Ch
- Page 465 and 466:
Chapter 7: Gaining Access to a Syst
- Page 467 and 468:
Chapter 9: Sniffers 425 19. C. A po
- Page 469 and 470:
Chapter 11: Denial of Service 427 8
- Page 471 and 472:
Chapter 12: Session Hijacking 429 1
- Page 473 and 474:
Chapter 14: SQL Injection 431 8. C.
- Page 475 and 476:
Chapter 15: Wireless Networking 433
- Page 477 and 478:
Chapter 17: Physical Security 435 9
- Page 479 and 480:
Appendix B About the Additional Stu
- Page 481 and 482:
Troubleshooting 439 System Requirem
- Page 483 and 484:
Index Note to the Reader: Throughou
- Page 485 and 486:
uffer overflows - cookies 443 buffe
- Page 487 and 488:
Department of Energy (DoE), attack
- Page 489 and 490:
File Transfer Protocol (FTP) - Goog
- Page 491 and 492:
HTTPRat tool - IP addresses 449 HTT
- Page 493 and 494:
Link Extractor utility - Microsoft
- Page 495 and 496:
New Connection Security Rule Wizard
- Page 497 and 498:
Post Office Protocol (POP) - Remote
- Page 499 and 500:
sequence numbers in packets - smurf
- Page 501 and 502:
stateful packet firewalls - teardro
- Page 503 and 504:
unsafe site warnings - webservers a
- Page 505 and 506:
Xmas tree scans - zone transfers 46
- Page 507:
WILEY END USER LICENSE AGREEMENT Go