02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

278 Chapter 11 ■ Denial of Service<br />

condition. Additionally, you saw that a NOP sled can be used to pad the program stack,<br />

which lets the attacker run malicious code within the compromised stack. You learned<br />

about compromised handlers and their role in infecting and controlling zombie clients in<br />

a DDoS attack. We also explored a number of attack methods and tools for performing<br />

attacks. Lastly, we reviewed some preventive measures, such as router throttling, that you<br />

can use to defend against DoS attacks.<br />

Exam Essentials<br />

Remember the basic concept of DoS and DDoS. Be familiar with the basic orchestration<br />

of a DoS attack as well as a DDoS attack. Browse the Web for DDoS images to become<br />

comfortable with recognizing the layout of an attack.<br />

Understand the targets. Know what resources can, and usually do, get targeted. This<br />

applies also to the focus of the DoS attack, which can be traffic or network saturation, or a<br />

single target.<br />

Know the stack. Review Figure 11.1 and Figure 11.2 and make sure you understand the<br />

parts that act on the stack. Remember that the EIP is the point of execution in a stack and<br />

that the EIP gets shifted when an overflow occurs.<br />

Understand buffer overflow. Know that a buffer overflow occurs when data, through<br />

either malicious or unintentional means, gets pushed beyond the normal memory bounds<br />

of the stack. Be familiar with the difference between a buffer overflow and smashing the<br />

stack.<br />

Know the dangerous C functions. Memorize and be on the lookout for those C functions<br />

that do not perform bounds checking: gets(), scanf(), strcpy(), and strcat(). Ensure<br />

that you are comfortable recognizing these commands in compiled code.<br />

Understand the NOP sled. Remember that NOP means No Operation; this equates to a<br />

full CPU cycle with no actual work being accomplished. A NOP sled is a sequence of NOP<br />

functions; know how it relates to buffer overflow and smashing the stack. Memorize and<br />

recognize the hexadecimal value of a NOP, which is 0x90.<br />

Be familiar with attack methods. You don’t have to know all the details of how to perform<br />

each attack method, but be sure to know what each method uses to perform the<br />

attack. For example, a fraggle attack uses UDP echo requests to the chargen port.<br />

Know the preventive measures. Know the preventive measures available as well as the<br />

actions each one takes to prevent the attack. Ensure that you are familiar with the operation<br />

of a reverse proxy and ingress and egress filtering.<br />

Know your tools and terms. The <strong>CEH</strong> exam is drenched with terms and tool names that<br />

will eliminate even the most skilled test taker because they simply don’t know what the<br />

question is even talking about. Familiarize yourself with all the key terms, and be able to<br />

recognize the names of the DoS tools on the exam.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!