In This Book You'll Learn How To:
- Build foundational of the seven-step ethical hacking process
- Perform footprinting activities by using open-source tools and the Internet.
- Use up-to-date hacking tools such as Metasploit, Amap, and Xprobe2.
- Detect malicious activity by installing and configuring Snort IDS.
- Understand DNS poisoning and how to prevent it.
- Configure password crackers used to check the strength of network authentication mechanisms.
- Monitor the activities of a honeypot to learn what malicious users are doing on your network.
- Analyze protocols such as IP, ICMP, and TCP to better understand their weaknesses.
- Find out how protocals such as ARP really work so that you can prevent ARP poisoning.
- Use steganographic tools to hide information and master other data-hiding methods such as NTFS file streaming.
Part 1: Exam Preparation
Chapter 1: The Business Aspects of Penetration Testing
Chapter 2: The Technical Foundations of Hacking
Chapter 3: Footprinting and Scanning
Chapter 4: Enumeration and System Hacking
Chapter 5: Linux and Automated Security Assessment Tools
Chapter 6: Trojans and Backdoors
Chapter 7: Session Hijacking, and Denial of Service
Chapter 8: Web Server Hacking, Web Applications, and Database Attacks
Chapter 9: Wireless Technologies, Security, and Attacks
Chapter 10: IDS, Firewalls, and Honeypots
Chapter 11: Buffer Overflows, Viruses, and Worms
etc.