Introduction |
|
xvii | |
Assessment Test |
|
xxiv | |
|
Chapter 1 Ethical Hacking |
|
|
1 | (8) |
|
|
2 | (2) |
|
Overview of Ethical Hacking |
|
|
4 | (1) |
|
Methodology of Ethical Hacking |
|
|
5 | (3) |
|
Reconnaissance and Footprinting |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
Chapter 2 Networking Foundations |
|
|
9 | (40) |
|
|
11 | (5) |
|
Open Systems Interconnection |
|
|
12 | (3) |
|
|
15 | (1) |
|
|
16 | (5) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (2) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (5) |
|
|
23 | (2) |
|
|
25 | (1) |
|
|
26 | (2) |
|
|
28 | (3) |
|
|
31 | (1) |
|
Internet Control Message Protocol |
|
|
32 | (1) |
|
|
33 | (3) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (8) |
|
|
37 | (2) |
|
Infrastructure as a Service |
|
|
39 | (1) |
|
|
40 | (2) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (2) |
|
|
46 | (3) |
|
Chapter 3 Security Foundations |
|
|
49 | (34) |
|
|
51 | (5) |
|
|
51 | (2) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (2) |
|
Policies, Standards, and Procedures |
|
|
58 | (3) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (9) |
|
|
61 | (4) |
|
Intrusion Detection Systems |
|
|
65 | (3) |
|
Intrusion Prevention Systems |
|
|
68 | (1) |
|
Security Information and Event Management |
|
|
69 | (1) |
|
|
70 | (8) |
|
|
71 | (2) |
|
|
73 | (1) |
|
|
74 | (2) |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
79 | (4) |
|
Chapter 4 Footprinting and Reconnaissance |
|
|
83 | (52) |
|
|
85 | (23) |
|
|
85 | (8) |
|
|
93 | (4) |
|
|
97 | (11) |
|
|
108 | (9) |
|
|
109 | (6) |
|
|
115 | (2) |
|
|
117 | (3) |
|
|
120 | (4) |
|
|
124 | (4) |
|
|
125 | (1) |
|
|
126 | (2) |
|
|
128 | (2) |
|
|
130 | (5) |
|
Chapter 5 Scanning Networks |
|
|
135 | (58) |
|
|
137 | (4) |
|
|
137 | (2) |
|
|
139 | (2) |
|
|
141 | (18) |
|
|
142 | (13) |
|
|
155 | (2) |
|
|
157 | (2) |
|
|
159 | (18) |
|
|
160 | (11) |
|
|
171 | (6) |
|
Packet Crafting and Manipulation |
|
|
177 | (8) |
|
|
178 | (2) |
|
|
180 | (3) |
|
|
183 | (2) |
|
|
185 | (2) |
|
|
187 | (2) |
|
|
189 | (4) |
|
|
193 | (40) |
|
|
195 | (3) |
|
|
198 | (6) |
|
|
198 | (2) |
|
|
200 | (4) |
|
|
204 | (11) |
|
|
205 | (2) |
|
|
207 | (2) |
|
|
209 | (3) |
|
|
212 | (3) |
|
Simple Network Management Protocol |
|
|
215 | (2) |
|
Simple Mail Transfer Protocol |
|
|
217 | (3) |
|
|
220 | (6) |
|
|
226 | (2) |
|
|
228 | (5) |
|
|
233 | (46) |
|
|
234 | (5) |
|
|
239 | (6) |
|
|
239 | (4) |
|
|
243 | (2) |
|
|
245 | (3) |
|
|
248 | (5) |
|
|
248 | (2) |
|
|
250 | (3) |
|
Client-Side Vulnerabilities |
|
|
253 | (2) |
|
|
255 | (17) |
|
|
255 | (5) |
|
|
260 | (2) |
|
|
262 | (3) |
|
|
265 | (7) |
|
|
272 | (2) |
|
|
274 | (5) |
|
|
279 | (42) |
|
|
281 | (6) |
|
|
281 | (1) |
|
|
282 | (2) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
287 | (18) |
|
|
288 | (8) |
|
|
296 | (9) |
|
|
305 | (6) |
|
|
305 | (3) |
|
|
308 | (3) |
|
|
311 | (3) |
|
|
314 | (1) |
|
|
314 | (2) |
|
|
316 | (5) |
|
|
321 | (36) |
|
|
322 | (15) |
|
|
323 | (6) |
|
|
329 | (2) |
|
|
331 | (4) |
|
Berkeley Packet Filter (BPF) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (5) |
|
|
342 | (8) |
|
|
342 | (4) |
|
|
346 | (2) |
|
|
348 | (2) |
|
|
350 | (2) |
|
|
352 | (5) |
|
Chapter 10 Social Engineering |
|
|
357 | (30) |
|
|
358 | (4) |
|
|
360 | (2) |
|
Social Engineering Vectors |
|
|
362 | (1) |
|
Physical Social Engineering |
|
|
362 | (6) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
368 | (3) |
|
|
371 | (4) |
|
|
371 | (3) |
|
|
374 | (1) |
|
Wireless Social Engineering |
|
|
375 | (4) |
|
Automating Social Engineering |
|
|
379 | (2) |
|
|
381 | (2) |
|
|
383 | (4) |
|
Chapter 11 Wireless Security |
|
|
387 | (32) |
|
|
388 | (19) |
|
|
390 | (2) |
|
|
392 | (1) |
|
|
393 | (4) |
|
Bring Your Own Device (BYOD) |
|
|
397 | (1) |
|
|
398 | (9) |
|
|
407 | (4) |
|
|
408 | (1) |
|
|
409 | (1) |
|
|
410 | (1) |
|
|
410 | (1) |
|
|
411 | (3) |
|
|
412 | (2) |
|
|
414 | (2) |
|
|
416 | (3) |
|
Chapter 12 Attack and Defense |
|
|
419 | (28) |
|
|
420 | (8) |
|
XML External Entity Processing |
|
|
422 | (1) |
|
Cross-Site Scripting (XSS) |
|
|
423 | (2) |
|
|
425 | (2) |
|
|
427 | (1) |
|
Denial of Service Attacks |
|
|
428 | (5) |
|
|
428 | (3) |
|
|
431 | (1) |
|
|
432 | (1) |
|
|
433 | (3) |
|
|
433 | (3) |
|
|
436 | (1) |
|
|
436 | (2) |
|
Defense in Depth/Defense in Breadth |
|
|
438 | (2) |
|
Defensible Network Architecture |
|
|
440 | (1) |
|
|
441 | (2) |
|
|
443 | (4) |
|
|
447 | (28) |
|
|
449 | (4) |
|
|
449 | (3) |
|
|
452 | (1) |
|
Symmetric Key Cryptography |
|
|
453 | (3) |
|
Data Encryption Standard (DES) |
|
|
453 | (1) |
|
Advanced Encryption Standard (AES) |
|
|
454 | (2) |
|
Asymmetric Key Cryptography |
|
|
456 | (3) |
|
|
456 | (1) |
|
|
457 | (1) |
|
Elliptic Curve Cryptography |
|
|
457 | (2) |
|
Certificate Authorities and Key Management |
|
|
459 | (6) |
|
|
459 | (3) |
|
|
462 | (1) |
|
|
463 | (2) |
|
|
465 | (2) |
|
|
467 | (2) |
|
|
469 | (2) |
|
|
471 | (4) |
|
Chapter 14 Security Architecture and Design |
|
|
475 | (26) |
|
|
476 | (2) |
|
|
478 | (3) |
|
|
478 | (1) |
|
|
479 | (1) |
|
|
480 | (1) |
|
Clark-Wilson Integrity Model |
|
|
480 | (1) |
|
|
481 | (11) |
|
n-tier Application Design |
|
|
482 | (3) |
|
Service-Oriented Architecture |
|
|
485 | (2) |
|
|
487 | (2) |
|
|
489 | (3) |
|
|
492 | (3) |
|
|
495 | (2) |
|
|
497 | (4) |
|
Appendix Answers to Review Questions |
|
|
501 | (30) |
|
Chapter 2 Networking Foundations |
|
|
502 | (1) |
|
Chapter 3 Security Foundations |
|
|
503 | (3) |
|
Chapter 4 Footprinting and Reconnaissance |
|
|
506 | (2) |
|
Chapter 5 Scanning Networks |
|
|
508 | (3) |
|
|
511 | (2) |
|
|
513 | (2) |
|
|
515 | (3) |
|
|
518 | (1) |
|
Chapter 10 Social Engineering |
|
|
519 | (3) |
|
Chapter 11 Wireless Security |
|
|
522 | (2) |
|
Chapter 12 Attack and Defense |
|
|
524 | (2) |
|
|
526 | (2) |
|
Chapter 14 Security Architecture and Design |
|
|
528 | (3) |
Index |
|
531 | |