office politics
It's all just 1s and 0s
- Messages
- 6,555
- Location
- in the lab
The Technical Foundations of Hacking
This chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering the following EC Council objectives:
-Understand the Open Systems Interconnect (OSI) Model
OSI is important as it is the basis for describing and explaining how many network services and attacks work.
-Have a basic knowledge of the Transmission Control Protocol/Internet Protocol (TCP/IP) and their functionality
Many attacks are based on the misuse of the protocols that are part of the TCP/IP suite of protocols.
-Describe the TCP packet structure
Many scanning techniques make use of the TCP packet and its structure.
-Know the TCP flags and their meaning
TCP flags control the flow of traffic and are used to illicit information from servers during enumeration.
-Understand how UDP differs from TCP
UDP is a stateless protocol; understanding how it functions is critical in knowing how it might respond to queries.
-Describe application ports and how they are numbered
Ports identify applications; although you might not need to know all 65,000, you will need to know some common ones.
-Describe how Internet Control Message Protocol (ICMP) functions and its purpose
ICMP plays an important role in detecting logical errors and providing diagnostic information.
Outline -
Introduction
The Attacker's Process
Performance Reconnaissance
Scanning and Enumeration
Gaining Access
Escalation of Privilege
Maintaining Access
Covering Tracks and Placing Backdoors
The Ethical Hacker's Process
National Institute of Standards Technology (NIST)
Threat and Risk Assessment Working Guide (TRAWG)
Operational Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
Open Source Security Testing Methodology Manual (OSSTMM)
Security and the Stack
The OSI Model
Anatomy of TCP/IP Protocols
Summary
Key Terms
Apply Your Knowledge
Exercises
Exam Questions
Answers to Exam Questions
Suggested Reading and Resources
This chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering the following EC Council objectives:
-Understand the Open Systems Interconnect (OSI) Model
OSI is important as it is the basis for describing and explaining how many network services and attacks work.
-Have a basic knowledge of the Transmission Control Protocol/Internet Protocol (TCP/IP) and their functionality
Many attacks are based on the misuse of the protocols that are part of the TCP/IP suite of protocols.
-Describe the TCP packet structure
Many scanning techniques make use of the TCP packet and its structure.
-Know the TCP flags and their meaning
TCP flags control the flow of traffic and are used to illicit information from servers during enumeration.
-Understand how UDP differs from TCP
UDP is a stateless protocol; understanding how it functions is critical in knowing how it might respond to queries.
-Describe application ports and how they are numbered
Ports identify applications; although you might not need to know all 65,000, you will need to know some common ones.
-Describe how Internet Control Message Protocol (ICMP) functions and its purpose
ICMP plays an important role in detecting logical errors and providing diagnostic information.
Outline -
Introduction
The Attacker's Process
Performance Reconnaissance
Scanning and Enumeration
Gaining Access
Escalation of Privilege
Maintaining Access
Covering Tracks and Placing Backdoors
The Ethical Hacker's Process
National Institute of Standards Technology (NIST)
Threat and Risk Assessment Working Guide (TRAWG)
Operational Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
Open Source Security Testing Methodology Manual (OSSTMM)
Security and the Stack
The OSI Model
Anatomy of TCP/IP Protocols
Summary
Key Terms
Apply Your Knowledge
Exercises
Exam Questions
Answers to Exam Questions
Suggested Reading and Resources