Chapter Download

The technical foundations of hacking - from 'Certified Ethical Hacker Exam Prep'

Certified Ethical Hacker cover
Along with the most current certified ethical hacker content, Certified Ethical Hacker Exam Prep also contains the elements that make Exam Preps such strong study aides: Comprehensive coverage of exam topics, end-of-chapter review, practice questions, exam alerts, fast facts, plus an entire practice exam to test your understanding of the material. This book also features MeasureUp's innovative testing software, to help you drill and practice your way to higher scores.

In this chapter: Ethical hackers differ from malicious hackers in that ethical hackers seek to do no harm and work to improve an organization's security by thinking like a hacker. This chapter discusses the OSI model and the TCP/IP protocol suite. It looks at some of the most commonly used protocols in the suite and examines how they are used and misused by hackers. Common ports are discussed; as is the principle of deny all. Starting with all ports and protocols blocked leaves the organization in much more of a secure stance than simply blocking ports that are deemed dangerous or unneeded.

Read the rest of the excerpt in this PDF.

Excerpted from Certified Ethical Hacker Exam Prep by Michael Gregg (ISBN: 0789735318).

Copyright © 2006, Que Publishing. Reproduced by permission of Que Publishing. Visit Amazon.com for a detailed description and to learn how to purchase this title.

This was first published in April 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: