Ahmed Sheikh

Certified Ethical Hacker (CEH) Preparation Guide

Lesson-Based Review of Ethical Hacking and Penetration Testing

1st ed.
Ahmed Sheikh
Miami, FL, USA
ISBN 978-1-4842-7257-2e-ISBN 978-1-4842-7258-9
© Ahmed Sheikh 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Apress imprint is published by the registered company APress Media, LLC part of Springer Nature.

The registered company address is: 1 New York Plaza, New York, NY 10004, U.S.A.

This book is affectionately dedicated to all IT experts, professionals, and students.

Introduction

This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker (CEH) exam—a qualification that tests the cybersecurity professional’s baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs.

You will review the organized certified hacking mechanism along with stealthy network recon, passive traffic detection, privilege escalation, vulnerability recognition, remote access, spoofing, impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation.

This book uses a unique “lesson” format with objectives and instruction to succinctly review each major topic, including footprinting, reconnaissance, scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking web servers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more.

What You Will Learn

You will get do the following:
  • Understand the concepts associated with footprinting

  • Perform active and passive reconnaissance

  • Identify enumeration countermeasures

  • Be familiar with virus types, virus detection methods, and virus countermeasures

  • Know the proper order of steps used to conduct a session hijacking attack

  • Identify defensive strategies against SQL injection attacks

  • Analyze internal and external network traffic using an intrusion detection system

Who This Book Is For

This book is for security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants, security engineers, and others.

Table of Contents
About the Author
Ahmed Sheikh

is a Fulbright alumnus and has earned a master’s degree in electrical engineering from Kansas State University, USA. He is a seasoned IT expert with a specialty in network security planning and skills in cloud computing. Currently, he is working as an IT Expert Engineer at a leading IT electrical company.

 
About the Technical Reviewer
Asad Ali

has been associated with High Speed Networks Lab, National Chiao Tung University, Taiwan since March 2018 where he is working on a research project funded by the Ministry of Science and Technology, Taiwan. In this project, he is designing a secure and federated authentication mechanism for multiple computing paradigms in collaboration with multiple partners in Bangladesh, Turkey, and USA. He is also working on the cost minimization of bi-directional offloading in federated computing paradigms. In the past, he worked with the Network Benchmarking Lab (NBL), Taiwan where he designed various security tests for IP cameras. He has various publications in the domains of computer networks, cognitive radio networks, PCB routing, optimization, Internet of Things, and network security.

 
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.171.235