Preview

Certified Ethical Hacking

Powerful Essays
Open Document
Open Document
97757 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Certified Ethical Hacking
Covers all Exam Objectives for CEHv6
Includes Real-World Scenarios, Hands-On Exercises, and Leading-Edge Exam Prep Software Featuring:

• Custom Test Engine • Hundreds of Sample Questions • Electronic Flashcards • Entire Book in PDF

CEH
STUDY GUIDE
Exam 312-50 Exam EC0-350



Certified Ethical Hacker
Kimberly Graves
SERIOUS SKILLS.

CEH: Certified Ethical Hacker Study Guide
CEH (312-50) Objectives Objective
Ethics and Legality Understand ethical hacking terminology Define the job role of an ethical hacker Understand the different phases involved in ethical hacking Identify different types of hacking technologies List the 5 stages of ethical hacking What is hacktivism? List different types of hacker classes Define the skills required to become an ethical hacker What is vulnerability research? Describe the ways of conducting ethical hacking Understand the legal implications of hacking Understand 18 U.S.C. § 1030 US Federal Law Footprinting Define the term footprinting Describe information gathering methodology Describe competitive intelligence Understand DNS enumeration Understand Whois, ARIN lookup Identify different types of DNS records Understand how traceroute is used in footprinting Understand how email tracking works Understand how web spiders work Scanning Define the terms port scanning, network scanning, and vulnerability scanning Understand the CEH scanning methodology Understand Ping Sweep techniques Understand nmap command switches Understand SYN, Stealth, XMAS, NULL, IDLE, and FIN scans List TCP communication flag types Understand war dialing techniques Understand banner grabbing and OF fingerprinting techniques Understand how proxy servers are used in launching an attack How do anonymizers work? Understand HTTP tunneling techniques Understand IP spoofing techniques

Chapter
1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 3

Objective
Enumeration What is enumeration? What is meant by null sessions? What is SNMP

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Susanhudson

    • 45484 Words
    • 182 Pages

    1. 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 2 2.1 2.2 2.3 2.4 3 3.1 3.2…

    • 45484 Words
    • 182 Pages
    Powerful Essays
  • Satisfactory Essays

    Ethical Hacking Lab

    • 445 Words
    • 2 Pages

    4. Enter the following command to view the pcap file in hexadecimal format (-x) using absolute, instead of relative, TCP sequence numbers (-S).…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Is582

    • 1220 Words
    • 5 Pages

    Scope of the exam: Covers Terminal Course Objectives (TCOs) A and B presented during weeks 1 and 2. The chapters covered are as follows:…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Any field of entry or input could be a potential point of vulnerability for buffer overflow. Input must be validate to prevent unexpected data for being process.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    N.B. The questions in this exam are taken, in part, from the tutorial questions – but expanded.…

    • 822 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Investigative Programs, Cyber Investigations: Operation "Web Snare". (2005). Federal Bureau of Investigation Website. Retrieved November 12, 2005 from, www.fbi.gov/cyberinvest/websmare.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    10 9 6 2 5 3 9 1 6 3 10 4 7 6 3 5 6 2 6 5 3 7 2…

    • 623 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    How has computer hacking inferred modern society? In this passage I will be talking briefly about the fundamentals of computer hacking from the past to the present. Computer hacking has changed more over time resulting in computer emergences to corporate system shutdowns. This research paper will be talking about three major parts of computer hacking. The first concept of hacking is the origin of creation. The next part will be how hacking has affect on the present-day society. Finally, the last piece of information will be going over the future of system hacking.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Good Essays

    We live in the time of the World Wide Web and it brings the biggest changes ever. The effects from this powerful invention, the Internet, has made the world flat and the opportunities huge. Every big change can have an affect on people, it could be positive or negative. In early 2002, researchers evaluated the presence and role of hackers and their role in technological innovations. “A decade ago, people in the tech field were angry that hackers had been labeled the dangerous villains who threatened national security” (Nissenbaum, 2015). This negative association contrasts with the beginning days of the 1970’s when hackers “were seen as ardent if quirky programmers, capable of near-miraculous,…

    • 1234 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    When we hear the word hacker we think of a person who has gained access to a system they do not have permission to access. “The first generation of hackers who emerged in the 1960s was individuals who would be called technology enthusiasts today. These early hackers would go on to create the foundation for technologies and the Internet such as the ARPANET” (Oriyano and Michael 2). They also initiated many early software development movements that led to what is known today as open source. Hacking was motivated by intellectual curiosity; causing damage or stealing information was against the rules for this small number of people. In the 1980s, hackers started gaining more of the negative connotations by which the public now identifies them. Movies such as War Games and media attention started altering the image of a hacker from a technology enthusiast to a computer criminal (“Hacking History”). During this time period, hackers engaged in activities such as theft of service by breaking into phone systems to make free phone calls. In many respects, the 1980s formed the basis for what a hacker is today. “Over the past two decades, the definition of what a hacker is has evolved dramatically from what was accepted in the 1980s and even the 1990s” (Oriyano and Michael 3). Hacker has become such a universal term. However, there are experience hackers who never break the law, and who define hacking as producing an outcome the system designer never anticipated. Some act with good intentions, others with bad intentions, and yet others with a mixture of both. No matter what the intentions were, the outcomes of their actions affected the world in some way. When popular organizations such as Microsoft and Apple were founded, they open a new and free attitude towards software development evolved (“Hacking History”). However the good came along with the bad. Some hackers were more interested in their own personal gain and strived to circumvent…

    • 2845 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    4 4 4 4 6 6 7 8 8 10 10 10 10 10 10 10 10 10 10 11 11…

    • 3405 Words
    • 14 Pages
    Powerful Essays

Related Topics