CONTENTS

Acknowledgments

Introduction

Chapter 1      Getting Started: Essential Knowledge

Security 101

Essentials

Security Basics

Introduction to Ethical Hacking

Hacking Terminology

The Ethical Hacker

Chapter Review

Questions

Answers

Chapter 2      Reconnaissance: Information Gathering for the Ethical Hacker

Footprinting

Passive Footprinting

Active Footprinting

Footprinting Methods and Tools

Search Engines

Website and E-mail Footprinting

DNS Footprinting

Network Footprinting

Other Tools

Chapter Review

Questions

Answers

Chapter 3      Scanning and Enumeration

Fundamentals

TCP/IP Networking

Subnetting

Scanning Methodology

Identifying Targets

Port Scanning

Evasion

Vulnerability Scanning

Enumeration

Windows System Basics

Enumeration Techniques

Chapter Review

Questions

Answers

Chapter 4      Sniffing and Evasion

Essentials

Network Knowledge for Sniffing

Active and Passive Sniffing

Sniffing Tools and Techniques

Techniques

Tools

Evasion

Devices Aligned Against You

Evasion Techniques

Chapter Review

Questions

Answers

Chapter 5      Attacking a System

Getting Started

Windows Security Architecture

Linux Security Architecture

Methodology

Hacking Steps

Authentication and Passwords

Privilege Escalation and Executing Applications

Hiding Files and Covering Tracks

Chapter Review

Questions

Answers

Chapter 6      Web-Based Hacking: Servers and Applications

Web Servers

Web Organizations

Attack Methodology

Web Server Architecture

Web Server Attacks

Attacking Web Applications

Application Attacks

Countermeasures

Chapter Review

Questions

Answers

Chapter 7      Wireless Network Hacking

Wireless Networking

Wireless Terminology, Architecture, and Standards

Wireless Hacking

Chapter Review

Questions

Answers

Chapter 8      Mobile Communications and the IoT

The Mobile World

Mobile Vulnerabilities and Risks

Mobile Platforms and Attacks

IoT

IoT Architecture

IoT Vulnerabilities and Attacks

IoT Hacking Methodology

Chapter Review

Questions

Answers

Chapter 9      Security in Cloud Computing

Cloud Computing

Cloud Security

Threats and Attacks

Chapter Review

Questions

Answers

Chapter 10    Trojans and Other Attacks

The “Malware” Attacks

Trojans

Viruses and Worms

Remaining Attacks

Denial of Service

Session Hijacking

Chapter Review

Questions

Answers

Chapter 11    Cryptography 101

Cryptography and Encryption Overview

Encryption Algorithms and Techniques

PKI, the Digital Certificate, and Digital Signatures

The PKI System

Digital Certificates

Digital Signatures

Encrypted Communication and Cryptography Attacks

Encrypted Communication

Cryptography Attacks

Chapter Review

Questions

Answers

Chapter 12    Low Tech: Social Engineering and Physical Security

Social Engineering

Human-Based Attacks

Computer-Based Attacks

Mobile-Based Attacks

Physical Security

Physical Security 101

Chapter Review

Questions

Answers

Chapter 13    The Pen Test: Putting It All Together

Methodology and Steps

The Security Assessments

Security Assessment Deliverables

Guidelines

More Terminology

Chapter Review

Questions

Answers

Appendix A    Tool, Sites, and References

Vulnerability Research Sites

Footprinting Tools

Scanning and Enumeration Tools

System Hacking Tools

Cryptography and Encryption

Sniffing

Wireless

Mobile and IoT

Trojans and Malware

Web Attacks

Miscellaneous

Tools, Sites, and References Disclaimer

Appendix B    About the Online Content

System Requirements

Your Total Seminars Training Hub Account

Single User License Terms and Conditions

TotalTester Online

Technical Support

Glossary

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.221.154.151