ebook img

Certified Ethical Hacker (CEH) Foundation Guide PDF

207 Pages·2016·12.15 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Certified Ethical Hacker (CEH) Foundation Guide

Certified Ethical Hacker (CEH) Foundation Guide — Sagar Ajay Rahalkar C ertified Ethical Hacker (CEH) Foundation Guide S agar Ajay Rahalkar Certified Ethical Hacker (CEH) Foundation Guide Sagar Ajay Rahalkar Pune, Maharashtra India ISBN-13 (pbk): 978-1-4842-2324-6 ISBN-13 (electronic): 978-1-4842-2325-3 DOI 10.1007/978-1-4842-2325-3 Library of Congress Control Number: 2016959970 Copyright © 2016 by Sagar Ajay Rahalkar This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Managing Director: Welmoed Spahr Lead Editor: Nikhil Karkal Technical Reviewer: Parag Patil Editorial Board: Steve Anglin, Pramila Balan, Laura Berendson, Aaron Black, Louise Corrigan, Jonathan Gennick, Robert Hutchinson, Celestin Suresh John, Nikhil Karkal, James Markham, Susan McDermott, Matthew Moodie, Natalie Pao, Gwenan Spearing Coordinating Editor: Prachi Mehta Copy Editor: James A. Compton Compositor: SPi Global Indexer: SPi Global Artist: SPi Global Distributed to the book trade worldwide by Springer Science+Business Media New York, 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail o T o my (late) mom, my supportive dad, my loving wife, my caring grandmother, and all my best buddies! Contents at a Glance About the Author ....................................................................................................xix Acknowledgments ..................................................................................................xxi Introduction ..........................................................................................................xxiii ■ Part I ................................................................................................... 1 ■ Chapter 1: Operating System Basics ..................................................................... 3 ■ Chapter 2: Database Basics ................................................................................. 23 ■ Chapter 3: Networking Basics ............................................................................. 37 ■ Chapter 4: Programming Basics for Security Enthusiasts and Hackers ............. 53 ■ Chapter 5: Virtualization and Cloud Basics ......................................................... 71 ■ Part II ................................................................................................ 83 ■ Chapter 6: Information Security Basics............................................................... 85 ■ Chapter 7: Penetration Testing ............................................................................ 97 ■ Chapter 8: Information Gathering ...................................................................... 109 ■ Chapter 9: Hacking Basics ................................................................................ 119 ■ Chapter 10: Web Application Hacking ............................................................... 131 ■ Chapter 11: Wireless Hacking ........................................................................... 143 ■ Chapter 12: Hacking Mobile Platforms .............................................................. 153 v ■ CONTENTS AT A GLANCE ■ Chapter 13: IDSes, Firewalls, and Honeypots .................................................... 161 ■ Chapter 14: Cryptography ................................................................................. 171 ■ Appendix A: Career Tracks Available after CEH ................................................. 183 ■ Appendix B: Interview Questions ...................................................................... 187 ■ Appendix C: Answers for Sample Questions...................................................... 189 Index ..................................................................................................................... 193 vi Contents About the Author ....................................................................................................xix Acknowledgments ..................................................................................................xxi Introduction ..........................................................................................................xxiii ■ Part I ................................................................................................... 1 ■ Chapter 1: Operating System Basics ..................................................................... 3 What Is an Operating System? ......................................................................................... 3 What Is a Kernel? ................................................................................................................................... 3 The Ring Architecture ............................................................................................................................. 4 What Is a File System? ........................................................................................................................... 4 What Are Device Drivers? ....................................................................................................................... 5 Memory Management: Stack versus Heap ....................................................................... 5 Microsoft Windows ........................................................................................................... 5 Windows Authentication: Local versus Centralized ................................................................................ 5 The Windows Registry ............................................................................................................................ 6 The Windows Event Viewer ..................................................................................................................... 7 Windows Services .................................................................................................................................. 8 Windows Processes .............................................................................................................................. 10 Windows Security Policies.................................................................................................................... 10 The Windows Firewall ........................................................................................................................... 12 Cheat-Sheet to Windows Commands ................................................................................................... 12 Linux ............................................................................................................................... 13 Linux Directory Structure ...................................................................................................................... 13 Passwords in Linux ............................................................................................................................... 14 vii ■ CONTENTS Linux Permissions in a Nutshell ........................................................................................................... 15 Processes ............................................................................................................................................. 16 Understanding the Linux Firewall (IP tables) ........................................................................................ 17 TCP Wrappers ....................................................................................................................................... 18 Cheat-Sheet to Linux Commands ......................................................................................................... 18 Summary ........................................................................................................................ 19 Do-It-Yourself (DIY) Exercises......................................................................................... 19 Test Your Knowledge: Sample Questions ....................................................................... 20 ■ Chapter 2: Database Basics ................................................................................. 23 What Is a Database?....................................................................................................... 23 Widely Used Database Software ........................................................................................................... 23 ACID Properties ..................................................................................................................................... 24 What Is SQL? .................................................................................................................. 24 Important Database Concepts ........................................................................................ 24 Data Defi nition Language: CREATE, ALTER, RENAME, DROP, TRUNCATE ............................................................................................................ 25 CREATE ................................................................................................................................................ 25 ALTER ................................................................................................................................................... 26 DROP .................................................................................................................................................... 27 TRUNCATE ............................................................................................................................................ 27 Data Control Language: GRANT, REVOKE ........................................................................ 27 GRANT ................................................................................................................................................... 27 REVOKE ................................................................................................................................................. 28 Query and Clauses: SELECT, FROM, WHERE, GROUP BY, HAVING, ORDER BY, DISTINCT ....................................................................................................... 28 SELECT and FROM ................................................................................................................................ 28 WHERE .................................................................................................................................................. 29 GROUP BY ............................................................................................................................................. 29 HAVING ................................................................................................................................................. 30 ORDER BY ............................................................................................................................................. 30 DISTINCT .............................................................................................................................................. 31 viii ■ CONTENTS Data Manipulation: INSERT, UPDATE, DELETE ................................................................. 31 INSERT ................................................................................................................................................. 31 UPDATE ................................................................................................................................................ 32 DELETE ................................................................................................................................................ 32 The Signifi cance of Symbols in SQL ............................................................................... 32 Query Processing Internals ............................................................................................ 33 Summary ........................................................................................................................ 33 Do-It-Yourself (DIY) Exercises......................................................................................... 34 Sample Questions .......................................................................................................... 34 ■ Chapter 3: Networking Basics ............................................................................. 37 The Open System Interconnection (OSI) Model .............................................................. 37 The TCP/IP Model ........................................................................................................... 38 Comparing the OSI and TCP/IP Models .......................................................................... 39 TCP Vs UDP ..................................................................................................................... 39 TCP Handshake and TCP Flags ....................................................................................... 40 IP Addressing and Sockets ............................................................................................ 41 Private IP and Public IP ................................................................................................. 41 Port Numbers ................................................................................................................ 42 IP V6 Basics .................................................................................................................... 43 MAC Addresses .............................................................................................................. 44 Introduction to DNS ....................................................................................................... 44 DHCP: Dynamic Host Control Protocol ........................................................................... 45 ARP: Address Resolution Protocol ................................................................................. 45 Network Address Translation: NAT ................................................................................. 46 Access Control Lists: ACL .............................................................................................. 47 VPN (Remote Access VPN, Site-to-Site VPN) ................................................................. 47 Common Network and Network Security Devices ......................................................... 48 Routers and Switches .......................................................................................................................... 48 Firewall, IDS, and IPS ............................................................................................................................ 48 ix ■ CONTENTS Summary ........................................................................................................................ 49 Do-It-Yourself (DIY) Exercises ........................................................................................ 50 Test Your Knowledge – Sample Questions .................................................................... 51 ■ C hapter 4: Programming Basics for Security Enthusiasts and Hackers ......................................................................................................... 53 Windows PowerShell ...................................................................................................... 53 The PowerShell Integrated Scripting Environment ............................................................................... 54 For Loops .............................................................................................................................................. 55 Pipes ..................................................................................................................................................... 55 File-Handling Functions ........................................................................................................................ 56 Web / Networking Functions ................................................................................................................ 57 Some Useful PowerShell Cmdlets ........................................................................................................ 58 Linux Shell Scripting ..................................................................................................... 58 Structural Basics of a Shell Script ........................................................................................................ 58 Creating Your First Shell Script ............................................................................................................. 59 Reading Input from the User ................................................................................................................. 59 Logic Building ....................................................................................................................................... 60 Redirection ........................................................................................................................................... 61 Python ............................................................................................................................ 63 Getting Started with Python .................................................................................................................. 63 Printing and Reading Input ................................................................................................................... 64 Lists ...................................................................................................................................................... 65 Conditions: IF-ELSE............................................................................................................................... 65 FOR Loops ............................................................................................................................................. 66 Functions .............................................................................................................................................. 66 Libraries and Modules .......................................................................................................................... 67 Summary ........................................................................................................................ 68 Do-It-Yourself (DIY) Exercises......................................................................................... 68 Test Your Knowledge: Sample Questions ....................................................................... 68 x

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.