Introduction |
|
xix | |
Assessment Test |
|
xxvi | |
|
Chapter 1 Ethical Hacking |
|
|
1 | (14) |
|
|
2 | (3) |
|
Overview of Ethical Hacking |
|
|
5 | (1) |
|
|
6 | (4) |
|
|
6 | (2) |
|
|
8 | (2) |
|
Methodology of Ethical Hacking |
|
|
10 | (3) |
|
Reconnaissance and Footprinting |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (2) |
|
Chapter 2 Networking Foundations |
|
|
15 | (42) |
|
|
17 | (5) |
|
Open Systems Interconnection |
|
|
18 | (3) |
|
|
21 | (1) |
|
|
22 | (5) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (2) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (5) |
|
|
29 | (2) |
|
|
31 | (2) |
|
|
33 | (1) |
|
|
34 | (4) |
|
|
38 | (1) |
|
Internet Control Message Protocol |
|
|
39 | (1) |
|
|
40 | (4) |
|
|
40 | (1) |
|
|
41 | (2) |
|
|
43 | (1) |
|
|
44 | (8) |
|
|
45 | (1) |
|
Infrastructure as a Service |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
49 | (2) |
|
|
51 | (1) |
|
|
52 | (2) |
|
|
54 | (3) |
|
Chapter 3 Security Foundations |
|
|
57 | (40) |
|
|
59 | (5) |
|
|
59 | (2) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (2) |
|
Policies, Standards, and Procedures |
|
|
66 | (3) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
Organizing Your Protections |
|
|
69 | (3) |
|
|
72 | (12) |
|
|
72 | (5) |
|
Intrusion Detection Systems |
|
|
77 | (3) |
|
Intrusion Prevention Systems |
|
|
80 | (1) |
|
Endpoint Detection and Response |
|
|
81 | (2) |
|
Security Information and Event Management |
|
|
83 | (1) |
|
|
84 | (8) |
|
|
84 | (2) |
|
|
86 | (1) |
|
Defensible Network Architecture |
|
|
87 | (1) |
|
|
88 | (2) |
|
|
90 | (2) |
|
|
92 | (1) |
|
|
93 | (4) |
|
Chapter 4 Footprinting and Reconnaissance |
|
|
97 | (58) |
|
|
99 | (25) |
|
|
99 | (9) |
|
|
108 | (3) |
|
|
111 | (13) |
|
|
124 | (12) |
|
|
125 | (5) |
|
|
130 | (3) |
|
|
133 | (3) |
|
|
136 | (3) |
|
|
139 | (5) |
|
|
144 | (4) |
|
|
144 | (2) |
|
|
146 | (2) |
|
|
148 | (2) |
|
|
150 | (5) |
|
Chapter 5 Scanning Networks |
|
|
155 | (66) |
|
|
157 | (4) |
|
|
157 | (2) |
|
|
159 | (2) |
|
|
161 | (22) |
|
|
162 | (14) |
|
|
176 | (2) |
|
|
178 | (2) |
|
|
180 | (3) |
|
|
183 | (20) |
|
|
184 | (12) |
|
|
196 | (6) |
|
Looking for Vulnerabilities with Metasploit |
|
|
202 | (1) |
|
Packet Crafting and Manipulation |
|
|
203 | (8) |
|
|
204 | (3) |
|
|
207 | (2) |
|
|
209 | (2) |
|
|
211 | (3) |
|
|
214 | (1) |
|
|
215 | (2) |
|
|
217 | (4) |
|
|
221 | (42) |
|
|
223 | (3) |
|
|
226 | (6) |
|
|
226 | (2) |
|
|
228 | (4) |
|
|
232 | (13) |
|
|
233 | (4) |
|
|
237 | (2) |
|
|
239 | (1) |
|
|
240 | (2) |
|
|
242 | (3) |
|
Simple Network Management Protocol |
|
|
245 | (2) |
|
Simple Mail Transfer Protocol |
|
|
247 | (3) |
|
|
250 | (7) |
|
|
257 | (2) |
|
|
259 | (4) |
|
|
263 | (56) |
|
|
265 | (4) |
|
|
269 | (7) |
|
|
270 | (4) |
|
|
274 | (2) |
|
|
276 | (3) |
|
|
279 | (10) |
|
|
280 | (2) |
|
|
282 | (2) |
|
|
284 | (5) |
|
Client-Side Vulnerabilities |
|
|
289 | (2) |
|
|
291 | (1) |
|
|
292 | (3) |
|
|
295 | (18) |
|
|
295 | (1) |
|
|
296 | (5) |
|
|
301 | (3) |
|
|
304 | (3) |
|
|
307 | (6) |
|
|
313 | (2) |
|
|
315 | (4) |
|
|
319 | (48) |
|
|
321 | (7) |
|
|
321 | (2) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
324 | (2) |
|
|
326 | (2) |
|
|
328 | (1) |
|
|
328 | (21) |
|
|
329 | (11) |
|
|
340 | (9) |
|
|
349 | (8) |
|
|
350 | (3) |
|
|
353 | (3) |
|
|
356 | (1) |
|
|
357 | (2) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (2) |
|
|
363 | (4) |
|
|
367 | (40) |
|
|
368 | (17) |
|
|
369 | (7) |
|
|
376 | (2) |
|
|
378 | (4) |
|
|
382 | (2) |
|
|
384 | (1) |
|
|
385 | (5) |
|
|
390 | (9) |
|
|
390 | (4) |
|
|
394 | (3) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
399 | (3) |
|
|
402 | (5) |
|
Chapter 10 Social Engineering |
|
|
407 | (32) |
|
|
408 | (5) |
|
|
410 | (2) |
|
Social Engineering Vectors |
|
|
412 | (1) |
|
Physical Social Engineering |
|
|
413 | (5) |
|
|
413 | (2) |
|
|
415 | (1) |
|
|
416 | (1) |
|
|
417 | (1) |
|
|
418 | (1) |
|
|
418 | (4) |
|
|
422 | (5) |
|
|
423 | (3) |
|
|
426 | (1) |
|
Wireless Social Engineering |
|
|
427 | (3) |
|
Automating Social Engineering |
|
|
430 | (3) |
|
|
433 | (2) |
|
|
435 | (4) |
|
Chapter 11 Wireless Security |
|
|
439 | (40) |
|
|
440 | (22) |
|
|
442 | (3) |
|
|
445 | (1) |
|
|
446 | (4) |
|
|
450 | (1) |
|
|
451 | (11) |
|
|
462 | (4) |
|
|
463 | (2) |
|
|
465 | (1) |
|
|
466 | (1) |
|
|
466 | (1) |
|
|
466 | (6) |
|
|
467 | (5) |
|
|
472 | (2) |
|
|
474 | (5) |
|
Chapter 12 Attack and Defense |
|
|
479 | (36) |
|
|
480 | (12) |
|
XML External Entity Processing |
|
|
482 | (1) |
|
|
483 | (2) |
|
|
485 | (2) |
|
|
487 | (2) |
|
|
489 | (1) |
|
Web Application Protections |
|
|
490 | (2) |
|
Denial-of-Service Attacks |
|
|
492 | (5) |
|
|
492 | (3) |
|
|
495 | (2) |
|
|
497 | (1) |
|
|
497 | (5) |
|
|
498 | (2) |
|
|
500 | (1) |
|
Application Protections and Evasions |
|
|
501 | (1) |
|
|
502 | (2) |
|
Defense in Depth/Defense in Breadth |
|
|
504 | (2) |
|
Defensible Network Architecture |
|
|
506 | (2) |
|
|
508 | (2) |
|
|
510 | (5) |
|
|
515 | (32) |
|
|
517 | (4) |
|
|
517 | (3) |
|
|
520 | (1) |
|
Symmetric Key Cryptography |
|
|
521 | (3) |
|
|
522 | (1) |
|
Advanced Encryption Standard |
|
|
523 | (1) |
|
Asymmetric Key Cryptography |
|
|
524 | (4) |
|
|
525 | (1) |
|
|
525 | (1) |
|
Elliptic Curve Cryptography |
|
|
526 | (2) |
|
Certificate Authorities and Key Management |
|
|
528 | (6) |
|
|
528 | (3) |
|
|
531 | (1) |
|
|
532 | (2) |
|
|
534 | (2) |
|
|
536 | (2) |
|
|
538 | (3) |
|
|
541 | (2) |
|
|
543 | (4) |
|
Chapter 14 Security Architecture and Design |
|
|
547 | (26) |
|
|
548 | (2) |
|
|
550 | (3) |
|
|
550 | (1) |
|
|
551 | (1) |
|
|
552 | (1) |
|
Clark-Wilson Integrity Model |
|
|
552 | (1) |
|
|
553 | (10) |
|
n-tier Application Design |
|
|
554 | (3) |
|
Service-Oriented Architecture |
|
|
557 | (2) |
|
|
559 | (2) |
|
|
561 | (2) |
|
|
563 | (4) |
|
|
567 | (2) |
|
|
569 | (4) |
|
Chapter 15 Cloud Computing and the Internet of Things |
|
|
573 | (44) |
|
|
574 | (12) |
|
|
578 | (5) |
|
Shared Responsibility Model |
|
|
583 | (2) |
|
|
585 | (1) |
|
Cloud Architectures and Deployment |
|
|
586 | (12) |
|
|
588 | (1) |
|
|
589 | (1) |
|
|
590 | (3) |
|
|
593 | (5) |
|
|
598 | (6) |
|
|
598 | (2) |
|
|
600 | (1) |
|
Web Application Compromise |
|
|
600 | (2) |
|
|
602 | (2) |
|
|
604 | (1) |
|
|
604 | (6) |
|
|
610 | (2) |
|
|
612 | (2) |
|
|
614 | (3) |
|
Appendix: Answers to Review Questions |
|
|
617 | (1) |
|
Chapter 2 Networking Foundations |
|
|
618 | (1) |
|
Chapter 3 Security Foundations |
|
|
619 | (3) |
|
Chapter 4 Footprinting and Reconnaissance |
|
|
622 | (2) |
|
Chapter 5 Scanning Networks |
|
|
624 | (3) |
|
|
627 | (2) |
|
|
629 | (3) |
|
|
632 | (3) |
|
|
635 | (1) |
|
Chapter 10 Social Engineering |
|
|
636 | (2) |
|
Chapter 11 Wireless Security |
|
|
638 | (3) |
|
Chapter 12 Attack and Defense |
|
|
641 | (2) |
|
|
643 | (2) |
|
Chapter 14 Security Architecture and Design |
|
|
645 | (1) |
|
Chapter 15 Cloud Computing and the Internet of Things |
|
|
646 | (3) |
Index |
|
649 | |
Introduction |
|
vi | |
|
Chapter 1 Practice Test 1 |
|
|
1 | (26) |
|
Chapter 2 Practice Test 2 |
|
|
27 | (28) |
|
Chapter 3 Practice Test 3 |
|
|
55 | (26) |
|
Chapter 4 Practice Test 4 |
|
|
81 | (26) |
|
Chapter 5 Practice Test 5 |
|
|
107 | (26) |
|
Appendix Answers to Practice Tests |
|
|
133 | (58) |
|
Chapter 1 Practice Test 1 |
|
|
134 | (11) |
|
Chapter 2 Practice Test 2 |
|
|
145 | (12) |
|
Chapter 3 Practice Test 3 |
|
|
157 | (12) |
|
Chapter 4 Practice Test 4 |
|
|
169 | (11) |
|
Chapter 5 Practice Test 5 |
|
|
180 | (11) |
Index |
|
191 | |