![Ethical Hacker's Certification Guide (CEHv11)](https://img.perlego.com/book-covers/3234767/9789391392161_300_450.webp)
Ethical Hacker's Certification Guide (CEHv11)
A comprehensive guide on Penetration Testing including Network Hacking, Social Engineering, and Vulnerability Assessment
Mohd Sohaib
- English
- ePUB (disponibile sull'app)
- Disponibile su iOS e Android
Ethical Hacker's Certification Guide (CEHv11)
A comprehensive guide on Penetration Testing including Network Hacking, Social Engineering, and Vulnerability Assessment
Mohd Sohaib
Informazioni sul libro
Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more.
Key Features
? Courseware and practice papers with solutions for C.E.H. v11.
? Includes hacking tools, social engineering techniques, and live exercises.
? Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing..
Description
The 'Certified Ethical Hacker's Guide' summarises all the ethical hacking and penetration testing fundamentals you'll need to get started professionally in the digital security landscape. The readers will be able to approach the objectives globally, and the knowledge will enable them to analyze and structure the hacks and their findings in a better way.The book begins by making you ready for the journey of a seasonal, ethical hacker. You will get introduced to very specific topics such as reconnaissance, social engineering, network intrusion, mobile and cloud hacking, and so on. Throughout the book, you will find many practical scenarios and get hands-on experience using tools such as Nmap, BurpSuite, OWASP ZAP, etc. Methodologies like brute-forcing, wardriving, evil twining, etc. are explored in detail. You will also gain a stronghold on theoretical concepts such as hashing, network protocols, architecture, and data encryption in real-world environments.In the end, the evergreen bug bounty programs and traditional career paths for safety professionals will be discussed. The reader will also have practical tasks and self-assessment exercises to plan further paths of learning and certification.
What you will learn
? Learn methodologies, tools, and techniques of penetration testing and ethical hacking.
? Expert-led practical demonstration of tools and tricks like nmap, BurpSuite, and OWASP ZAP.
? Learn how to perform brute forcing, wardriving, and evil twinning.
? Learn to gain and maintain access to remote systems.
? Prepare detailed tests and execution plans for VAPT (vulnerability assessment and penetration testing) scenarios.
Who this book is for
This book is intended for prospective and seasonal cybersecurity lovers who want to master cybersecurity and ethical hacking. It also assists software engineers, quality analysts, and penetration testing companies who want to keep up with changing cyber risks.
Table of Contents
1. Cyber Security, Ethical Hacking, and Penetration Testing
2. CEH v11 Prerequisites and Syllabus
3. Self-Assessment
4. Reconnaissance
5. Social Engineering
6. Scanning Networks
7. Enumeration
8. Vulnerability Assessment
9. System Hacking
10. Session Hijacking
11. Web Server Hacking
12. Web Application Hacking
13. Hacking Wireless Networks
14. Hacking Mobile Platforms
15. Hacking Clout, IoT, and OT Platforms
16. Cryptography
17. Evading Security Measures
18. Practical Exercises on Penetration Testing and Malware Attacks
19. Roadmap for a Security Professional
20. Digital Compliances and Cyber Laws
21. Self-Assessment-1
22. Self-Assessment-2
Domande frequenti
Informazioni
CHAPTER 1
Cyber Security, Ethical Hacking, and Penetration Testing
Introduction
Structure
- Cyber security introduction
- Principles of security for information systems
- Hacking concepts
- Ethical hacking and penetration testing
Objectives
The Ten Thousand Feet View
Cyber Security
- Information Systems: Any and all logical and physical assets containing or leading to a piece of data, information, resource, or leverage is an information system. From a piece of memo on your office desk to the mobile phone in your pocket to the enterprise data centers, all in their own existence are information systems.
- Information Security: The protection of an information asset from any unauthorized and unauthenticated access, modification, retrieval or erasure, all the while providing meaningful access to the actual system user constitutes the essence of information security. The security may hence be in the form of a security guard, a lock and key set, or a high-end multi-factor authentication.
![](https://book-extracts.perlego.com/3234767/images/Figure-1.1-plgo-compressed.webp)
- Ransomware: A piece of code to hold digital assets hostage for monetary benefits. The code generally encrypts the information it infects, with the attacker being the only one with the readily available ability to decrypt the compromised information.
- Denial of services by flooding the communication channel with requests to overwhelm the underlying systems and disrupting businesses.
- Financial frauds by impersonating legitimate users or gaining access to their assets via differing means.
- Cyber activism, wherein activists target digital infrastructure supporting unethical business practices or social misdemeanors.
- Cyber terrorism employed by the new age terrorists, wherein they target government and military facilities via their digital infrastructure.
- Maligning target reputation out of revenge or rivalry.
- Quality of source code: The quality of the source code deployed for an application would directly affect the security of the application. For a developer, it is of paramount importance that there are no loopholes and backdoor entries to the application. An example of this would be to make sure the application does not process or execute any script code fed externally via inputs.
- Development environment: An unsecure development or testing platform could potentially lead to the inclusion of bugs that are not directly associated with the code and the functionality of the system. These include bugs in a compiled code structure and its interpretation by the underlying system.
- Deployment environment: The actual final place of residence of the application is its deployment environment, which is majorly an ecosystem of multiple software solutions. Since the code will execute in this environment, it is of paramount importance that the environment in itself is as thoroughly sanitized as the code. There could be unrestricted network access, backdoors, and bugs within the deployment environment which might have gone unnoticed by the vendor or unpatched by the system administrator.
- System handlers: The people who maintain the system and have access to the application environment more often than not are the main vectors of breaches. A skipped patch or careless disposal of sensitive waste or simply not following the standard operation guidelines result in massive data breaches all the time.
- End user: While a majority of the development happens in line with the happy scenarios of application usage, the end user is in fact the most unpredictable of all. A good system design could strive to cover all routes of execution, but with applications that have huge user base, this would be an impossible task. Another concern is the malicious user, the one who onboards the system just to break it.
- Technological advancements: While advancements would sound great for a system, there is usually a cost involved in upgrading the solutions already deployed to bring them up at par. This often results in an environment being a mix of technologies that may not complement each other after a period of time as they were during the initiation phases. Also, the vendors tend to stop support and the patching of older systems to focus on maintaining the newer ones. This leaves the older systems at much greater risks.
- Confidentiality: That the information stored remain confidential, clear of prying eyes and void of any unauthorized access.
- Integrity: That the information stored maintains the actual form and remains free of any adulteration via unauthorized means. This includes maintaining records of access and operations by legitimate system users as well to put the onus on them for their actions.
- Availability: The information stored needs to be readily and timely available and accessible to the legitimate party in a manner agreed upon. Similar to justice, information delivered late is useless information.
- Authenticity: This is to ensure that each user receives a genuine piece of information and is presented a means to check the authenticity at each step of information transfer. This is especially needed when 62% of all businesses are exposed to phishing and social engineering attacks.
- Non-repudiation: This guarantees that a piece of information was successfully and actually sent by an identifiable source and indeed received by the intended destination. Non-repudiation ensures that there is no speculation on the communication of information, and neither the sender nor the receiver can deny participating in the transaction.
![](https://book-extracts.perlego.com/3234767/images/Figure-1.2-plgo-compressed.webp)
- Effort: To implement a measure would require effort and so would building doorways through it for a legitimate user.
- Time: For every effort, there would be an associated timeline. Further, for each doorway, there would be an introduction of access delay.
- Cost: For every set of effort and time, there would be an associated cost of development as well as maintenance.
Indice dei contenuti
- Cover Page
- Title Page
- Copyright Page
- Dedication Page
- About the Author
- About the Reviewer
- Acknowledgement
- Preface
- Errata
- Table of Contents
- 1. Cyber Security, Ethical Hacking, and Penetration Testing
- 2. CEH v11 Prerequisites and Syllabus
- 3. Self-Assessment
- 4. Reconnaissance
- 5. Social Engineering
- 6. Scanning Networks
- 7. Enumeration
- 8. Vulnerability Assessment
- 9. System Hacking
- 10. Session Hijacking
- 11. Web Server Hacking
- 12. Web Application Hacking
- 13. Hacking Wireless Networks
- 14. Hacking Mobile Platforms
- 15. Hacking Cloud, IoT, and OT Platforms
- 16. Cryptography
- 17. Evading Security Measures
- 18. Practical Exercises on Penetration Testing and Malware Attacks
- 19. Roadmap for a Security Professional
- 20. Digital Compliances and Cyber Laws
- 21. Self-Assessment 1
- 22. Self-Assessment 2
- Index