Chapter Download

The technical foundations of hacking - from 'Certified Ethical Hacker Exam Prep'

Certified Ethical Hacker cover
Along with the most current certified ethical hacker content, Certified Ethical Hacker Exam Prep also contains the elements that make Exam Preps such strong study aides: Comprehensive coverage of exam topics, end-of-chapter review, practice questions, exam alerts, fast facts, plus an entire practice exam to test your understanding of the material. This book also features MeasureUp's innovative testing software, to help you drill and practice your way to higher scores.

In this chapter: Ethical hackers differ from malicious hackers in that ethical hackers seek to do no harm and work to improve an organization's security by thinking like a hacker. This chapter discusses the OSI model and the TCP/IP protocol suite. It looks at some of the most commonly used protocols in the suite and examines how they are used and misused by hackers. Common ports are discussed; as is the principle of deny all. Starting with all ports and protocols blocked leaves the organization in much more of a secure stance than simply blocking ports that are deemed dangerous or unneeded.

Read the rest of the excerpt in this PDF.

Excerpted from Certified Ethical Hacker Exam Prep by Michael Gregg (ISBN: 0789735318).

Copyright © 2006, Que Publishing. Reproduced by permission of Que Publishing. Visit Amazon.com for a detailed description and to learn how to purchase this title.

This was first published in April 2006

Join the conversationComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.