Книга Ethical Hacker Certification From Specialized Solutions 9 Cd

Ethical Hacker Certification From Specialized Solutions 9 Cd
 
Книги Хакерство
Год издания: 2008
Формат: pdf
Страниц: ОЧИНИ
Размер: 400
Язык: Русский
  • 68
 (голосов: 2)
Оценка:
Ethical Hacker Certification From Specialized Solutions 9 CdWith this certification, you will begin to understand how a hacker thinks and what tactics they use to penetrate corporate networks. This allows system administrators to deploy proactive countermeasures and stay ahead of information security developments and exploited vulnerabilities. The Certified Ethical Hacker Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 21 topical domains. Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective against their use.

Ethics and Legal Issues
• Footprinting Techniques
• Scanning
• Enumeration
• System Hacking
• Trojans and Backdoors
• Sniffers
• Denial of Service
• Social Engineering
• Session Hijacking
• CEH Hacking Web Servers
• Web Application Vulnerabilities
• Web Based Password Cracking
• SQL Injection
• Hacking Wireless Networks
• Virus and Worms
• Hacking Novell
• Hacking Linux
• IDS, Firewalls and Honeypots
• Buffer Overflows
• Cryptography
• Penetration Testing Methodologies Download

[color=red]CEH Introduction
Module 1 - Introduction to Ethical Hacking
What Does a malicious Hacker Do?
Hacker Classes
Vulnerability Research
Ethical Hacking Testing
Security Websites

Module 2 - Footprinting
Reconnaissance Phase and Footprinting
Scenario (cont.)
Tools - Sam Spade
Tools - NewTrace
Tools - The WayBackMachine
Tools - Smart Whois
Tools - Read Notify

Module 3 - Scanning
Checking for live systems
Banner Grabbing
Scenario (cont.)
Tools - Angry IP
Tools - Nmap
Tools - NetScanTools Pro
Banner Grabbing
Netcraft - OS Detection Tool
SocksChain

Module 4 - Enumeration
What is Enumeration
SNMP Enumeration
Example - Connect Using Null Session
Tools - DumpSEC
SID
GetAcct Tool
SolarWinds
Tools - UserInfo
Tools - UserIP

Module 5 - System Hacking
Cracking Passwords
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Tool - Legion
Tool - Keylogger - Proof of Concept
Tool - LophtCrack Password Cracking Tool
Tool - pwdump Password Cracking Tool
Tool - GetAdmin Tool
Tool - Create Local Admin User X
Tool - Stealth Files
Tool - Spam mimic - Hide Messages Using Normal Text
Tool - Snow - Steganography

Module 6 - Trojans and Backdoors
Indications of a Trojan Attack
ICMP Tunneling
Trojan Horse Construction Kit
Anti-Trojan Software
Example - Tini Trojan
Example - NetBus Trojan
Example - Beast Trojan
Example - YAB - Wrapper
Tool - fPort
Tool - TCPView

Module 7 - Sniffers
Types of Sniffing
Sniffer Hacking Tools
Raw Sniffing Tools
Countermeasures
Tool - Ethereal
Tool - SMAC
Tool - Dsniff
Tool - WebSpy
Tool - Etherpeek

Module 8 - Denial of Service
What are Denial of Service Attacks
DoS Attack Tools
DDoS Attacks
Reflected DoS Attacks
Example - Ping of Death
Example - Freak88

Module 9 - Social Engineering
Module 10 - Session Hijacking

Programs That Perform Session Hijacking
Demo - Hijacking a Telnet Session

Module 11 - Hacking Web Servers
Server Vulnerabilities
Vulnerability Scanners
Example - RPC Hack
Example - Metasploit Framework
Example - Internet Printing Exploit
Example - LSA Exploit
Example - Unicode
Example - Shadow Security Scanner

Module 12 - Web Application Vulnerabilities
Web Application Setup & Hacking
Web Application Threats
Web Application Hacking Tools
Tool Example - BlackWidow
Tool Example - Google
Tool Example - IE Cache Extractor
Tool Example - Generate Unicode Strings
IE Vulnerabilities


Module 13 - Web-Based Password Cracking Techniques
Authentication
What is a Password Cracker
Countermeasures
Tool Example - Obiwan
Using Wordlists
Tool Example - SnadBoy
Using IE to View Passwords


Module 14 - SQL Injection
SQL Injection Techniques
SQL Injection Automated Tools
Countermeasures
Example - SQL Injection
Example - SQL Injection Techniques
Example - SQL Scanner

Module 15 - Hacking Wireless Networks
Introduction to Wireless Networking
Wired Equivalent Privacy
Scanning Tools
Sniffing Tools
Securing Wireless Networks
Tool Example - AiroPeek

Module 16 - Virus
Virus History
Virus Classification
Virus Construction and Detection
Example - Virus Tools
Example - Create a Virus
Example - Virus Construction Kit

Module 17 - Physical Security
Security Statistics & Incidents
Physical Security Checklist
Locks

Module 18 - Linux Hacking
Why Linux?
Scanning in Linux
Hacking Tools
Rootkits
Linux Intrusion Detection System - LIDS
Linux Tools
Example - Whois
Example - Root Access
Example - Compile in Linux
Tool - Ethereal
Tool - IP Sorcery
Tool - NMap
Tool - Snort

Module 19 - Evading IDS, Firewalls and detecting Honey Pots
Intrusion Detection Tools
IDS Evasion
Firewalls
HoneyPot
Example - ICMP Shell
Example - WWW Reverse Shell


Module 20 - Buffer Overflows
Reasons for Attacks
NOPS
Defense Against Buffer Overflows
Example - Buffer Overflow

Module 21 - Cryptography
PKIs
RSA Attacks and Algorithms
Code Breaking Methodologies

Module 22 - Penetration Testing
Vulnerability Assessment
Terms of Engagement
Filtering Devices
Impact of Threat
Phases of Penetration Testing







Password
CODE
www.ebooksclan.org

http://rapidshare.com/files/101330599/Specialized_Solutions_Certified_Ethical_Hacker_9CD.part1.rar
http://rapidshare.com/files/101354462/Specialized_Solutions_Certified_Ethical_Hacker_9CD.part2.rar
http://rapidshare.com/files/101374177/Specialized_Solutions_Certified_Ethical_Hacker_9CD.part3.rar
http://rapidshare.com/files/101389819/Specialized_Solutions_Certified_Ethical_Hacker_9CD.part4.rar
http://rapidshare.com/files/101438053/Specialized_Solutions_Certified_Ethical_Hacker_9CD.part5.rar
http://rapidshare.com/files/101467116/Specialized_Solutions_Certified_Ethical_Hacker_9CD.part6.rar
http://rapidshare.com/files/101491440/Specialized_Solutions_Certified_Ethical_Hacker_9CD.part7.rar
http://rapidshare.com/files/101508497/Specialized_Solutions_Certified_Ethical_Hacker_9CD.part8.rar

IURA
1
22 мая 2008
ссылки не работают! :-(
#1
ponart
Добавление комментария к книге Ethical Hacker Certification From Specialized Solutions 9 Cd


 
Книги
... Техническая литература
...... Машиностроение
...... Строительство
...... Электротехника и связь
...... Нормативная литература
...... Гидравлика
... Гуманитарная литература
...... Менеджмент
...... Экономика
...... Управление персоналом
...... Маркетинг
...... Бухгалтеру
...... Логистика
... Компьютеры и сети
...... WEB-design
......... WEB дизайн
......... HTML
......... CSS
......... Java Script
......... PHP
......... AJAX
......... ASP.NET
...... Офисные приложения
......... Microsoft Office
...... Языки программирования
......... Assembler
......... С/С++/Visual C
......... С#
......... Delphi
......... Perl
......... Pascal / Turbo Pascal
......... Kylix
......... Fortran
......... Python
......... XML
......... Java
......... Basic / Visual Basic
......... Win32 API
...... Базы данных
......... СУБД
......... SQL / MySQL
......... Oracle
......... ADO.NET
......... Access
......... InterBase
...... Сетевые технологии
......... Cisco
......... Хакерство
......... Компьютерные сети
......... Криптография
......... Компьютерная безопасность
......... IP телефония
...... Операционные системы
......... Windows
......... Linux
......... Unix
......... FreeBSD
......... Symbian OS
......... Mac OS
...... Графика, дизайн, звук
......... Adobe Photoshop
......... Corel Draw
......... OpenGL
......... Flash\flex
......... Pinnacle Studio
......... Adobe Premier
......... 3D Studio MAX
......... Maya
......... Цифровая фотография
......... Sound Forge
...... CAD / CAE
......... Ansys
......... AutoCAD
......... ArchiCAD
......... P-CAD
......... MathCAD, Matlab, Visim
......... SolidWorks
......... КОМПАС
......... OrCad
...... ПК
......... Самоучители
......... BIOS
......... Ремонт и модернизация
......... Интернет
...... Созд. / Продвиж. сайта
... Фундаментальные дисциплины
...... Математика
...... Физика
...... Химия
...... Биология
...... Естествознание
...... Русский язык и литература
...... География
...... Астрономия
... Нехудожественная литература
...... Нумизматика, каталоги
...... Дом. Быт. Досуг
...... Искусство. Живопись
...... Туризм. Фото. Спорт
...... Иностранные языки
...... Религия. Эзотерика
...... Наука. Техника
...... Медицина
...... Исторические
...... Авто
...... Кулинария
...... Вооружение
...... Дизайн
...... Рукоделие
...... Психология, философия
...... Сад / огород
...... Любовь / Sex
...... Музыка
...... Выпивка / Алкоголь
... Детская литература
... Стихи и сказки
... Комиксы
... Раскраски
... Познавательная литература
... Обучение, развитие
... Справочники
... Энциклопедии
... Словари
... Бизнес книги
... Руководства
... English литература
... Платные книги
Журналы
... Технические журналы
... Гуманитарные журналы
... Компьютерные журналы
... Журналы по WEB-design
... Развлекательные журналы
... Детские журналы
Художественные книги
... Аудио книги
... Боевики
... Детективы
... Фантастика | Мистика
... Любовные романы
ВИДЕОУРОКИ
... Платные видеоуроки
Программы для чтения
Генератор RSS-лент
Реклама на сайте
Правила сайта
Яндекс цитирования
Регистрация Забыли пароль?
Электронная библиотека книг
 

Например: Гарри Поттер

      Мы Вконтакте

аудит работоспособности сайта
 
Загрузка. Пожалуйста, подождите...