100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Samenvatting

CEH EC-council volledige samenvatting benodigd voor het tentamen

Beoordeling
-
Verkocht
-
Pagina's
148
Geüpload op
22-01-2023
Geschreven in
2022/2023

deze samenvatting bevat de belangrijkste informatie voor alle 20 hoofdstukken die behandeld worden in het tentamen.












Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Heel boek samengevat?
Ja
Geüpload op
22 januari 2023
Aantal pagina's
148
Geschreven in
2022/2023
Type
Samenvatting

Voorbeeld van de inhoud

snmp

Inhoud
Module 2: Footprinting and Reconnaissance .......................................................................................... 4
Information obtained in footprinting .............................................................................................. 4
Footprinting objectives & threats ................................................................................................... 5
Footprinting methodology .............................................................................................................. 6
Module 3: Scanning networks ............................................................................................................... 10
Network scanning concepts .............................................................................................................. 10
Scanning tools ................................................................................................................................... 11
Host discovery ................................................................................................................................... 12
Port and service discovery................................................................................................................. 16
OS discovery ...................................................................................................................................... 20
Scanning beyond IDS and Firewall..................................................................................................... 21
Draw network diagrams .................................................................................................................... 21
Module 04: Enumeration ...................................................................................................................... 22
Enumeration concepts ...................................................................................................................... 22
NetBIOS enumeration ....................................................................................................................... 23
Sami El Farj &

CEH SAMENVATTING
SNMP enumeration ........................................................................................................................... 24
Stan van der veen
LDAP enumeration ............................................................................................................................ 25
NTP and NFS enumeration ................................................................................................................ 26
SMTP and DNS enumeration ............................................................................................................. 27
Other enumeration techniques ......................................................................................................... 29
Enumeration countermeasures......................................................................................................... 31
Module 5: vulnerability analysis............................................................................................................ 32
Module 6: System hacking .................................................................................................................... 33
CEH Hacking Methodology (CHM)..................................................................................................... 33
System Hacking Goals........................................................................................................................ 34
Gaining Access ................................................................................................................................... 34
Password Cracking............................................................................................................................. 35
Password Recovery Tools .................................................................................................................. 37
Buffer Overflow ................................................................................................................................. 37
Escalating Privileges .......................................................................................................................... 37
Maintaining Access ............................................................................................................................ 38
Module 7: Malware threats................................................................................................................... 39
Malware concepts ............................................................................................................................. 39

, APT Concepts ..................................................................................................................................... 40
Trojan Concepts................................................................................................................................. 41
Virus and Worm Concepts................................................................................................................. 45
Filless Malware Concepts .................................................................................................................. 52
Malware analysis ............................................................................................................................... 55
Module 8: Sniffing ................................................................................................................................. 58
Sniffing Concepts ............................................................................................................................... 58
Network Sniffing ............................................................................................................................ 58
Types of Sniffing ............................................................................................................................ 58
SPAN Port ...................................................................................................................................... 60
Wiretapping ................................................................................................................................... 61
Sniffing Technique: MAC Attacks ...................................................................................................... 61
MAC Address ................................................................................................................................. 62
CAM Table ..................................................................................................................................... 62
How CAM Works ............................................................................................................................... 62
What Happens when a CAM Table is Full? ........................................................................................ 62
MAC Flooding ................................................................................................................................ 63
Switch Port Stealing........................................................................................................................... 63
Sniffing Technique: DHCP Attacks ..................................................................................................... 64
DHCP Starvation Attack ................................................................................................................. 64
Rogue DHCP Server Attack ............................................................................................................ 64
Sniffing Technique: ARP Poisoning .................................................................................................... 64
What Is Address Resolution Protocol (ARP)? ................................................................................ 65
ARP Spoofing Attack ...................................................................................................................... 65
Sniffing Technique: Spoofing Attacks ................................................................................................ 66
MAC Spoofing/Duplicating ............................................................................................................ 66
IRDP Spoofing ................................................................................................................................ 66
VLAN Hopping................................................................................................................................ 67
STP Attack .......................................................................................................................................... 67
Sniffing Technique: DNS Poisoning ................................................................................................... 68
DNS Poisoning Techniques ............................................................................................................ 68
Sniffing Tools ..................................................................................................................................... 69
Module 9: Social engineering ................................................................................................................ 70
Social engineering concepts .............................................................................................................. 70
Social engineering techniques ........................................................................................................... 71
Insider threats/attacks ...................................................................................................................... 74

, Impersonation on social networking sites ........................................................................................ 74
Identify theft...................................................................................................................................... 74
Countermeasures .............................................................................................................................. 75
Module 10: denial of service ................................................................................................................. 77
DoS/DDoS Concepts .......................................................................................................................... 77
What is a DoS Attack? ................................................................................................................... 77
What is a DDoS Attack? ................................................................................................................. 77
How do DDoS Attacks Work? ........................................................................................................ 77
DoS/DDoS Attack Techniques ........................................................................................................... 78
Basic Categories of DoS/DDoS ....................................................................................................... 78
UDP Flood Attack........................................................................................................................... 78
Ping of Death Attack ...................................................................................................................... 79
Smurf Attack .................................................................................................................................. 79
Pulse Wave .................................................................................................................................... 79
Zero-Day DDoS Attack ................................................................................................................... 79
SYN Flood Attack ........................................................................................................................... 79
Fragmentation Attack .................................................................................................................... 80
Spoofed Session Flood Attack ....................................................................................................... 81
HTTP GET/POST Attack ...................................................................................................................... 81
Slowloris Attack ............................................................................................................................. 81
UDP Application Layer Flood Attack.............................................................................................. 82
Multi-Vector Attack ....................................................................................................................... 82
Peer-to-Peer Attack ....................................................................................................................... 82
Permanent Denial-of-Service Attack ............................................................................................. 83
Distributed Reflection Denial-of-Service (DRDoS) Attack ............................................................. 83
Botnets .............................................................................................................................................. 84
Botnets .......................................................................................................................................... 84
How Does Malicious Code Propagate? ......................................................................................... 85
DoS/DDoS Attack Tools ..................................................................................................................... 86
Module 11: Session Hijacking ................................................................................................................ 87
Session hijacking concepts ................................................................................................................ 87
Application-level session Hijacking ................................................................................................... 89
Network level session hijacking......................................................................................................... 94
Countermeasures .............................................................................................................................. 96
Module 12: evading IDS, firewalls & honeypots ................................................................................. 100
Module 13: hacking web servers......................................................................................................... 112

, Module 14: hacking web applications ................................................................................................. 113
Module 15: SQL Injection .................................................................................................................... 114
SQL injection concepts .................................................................................................................... 114
Types of SQL Injection ..................................................................................................................... 117
SQL Injection Methodology ............................................................................................................. 121
SQL injection tools ........................................................................................................................... 126
Evasion techniques .......................................................................................................................... 126
Module 16: Hacking Wireless Networks ............................................................................................. 128
Wireless concepts............................................................................................................................ 128
Wireless encryption......................................................................................................................... 129
Wireless threats............................................................................................................................... 129
Wireless hacking methodology ....................................................................................................... 129
Wireless hacking tools ..................................................................................................................... 129
Bluetooth hacking ........................................................................................................................... 129
Countermeasures ............................................................................................................................ 129
Wireless security tools .................................................................................................................... 129
Module 17: hacking mobile platforms ................................................................................................ 130
Module 18: IoT hacking ....................................................................................................................... 131
Module 20: Cryptograhpy ................................................................................................................... 132

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
stanvanderveen1998 Hogeschool Windesheim
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
26
Lid sinds
4 jaar
Aantal volgers
21
Documenten
6
Laatst verkocht
1 jaar geleden

4,0

8 beoordelingen

5
3
4
2
3
3
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen