The technical foundations of hacking - from 'Certified Ethical Hacker Exam Prep'

This chapter from 'Certified Ethical Hacker Exam Prep' by Michael Gregg discusses attacker methodology, as well as some of the methodologies used by ethical hackers. Ethical hackers differ from malicious hackers in that ethical hackers seek to do no harm and work to improve an organization's security by thinking like a hacker.

Certified Ethical Hacker cover
 

Along with the most current certified ethical hacker content, Certified Ethical Hacker Exam Prep also contains the elements that make Exam Preps such strong study aides: Comprehensive coverage of exam topics, end-of-chapter review, practice questions, exam alerts, fast facts, plus an entire practice exam to test your understanding of the material. This book also features MeasureUp's innovative testing software, to help you drill and practice your way to higher scores.

In this chapter: Ethical hackers differ from malicious hackers in that ethical hackers seek to do no harm and work to improve an organization's security by thinking like a hacker. This chapter discusses the OSI model and the TCP/IP protocol suite. It looks at some of the most commonly used protocols in the suite and examines how they are used and misused by hackers. Common ports are discussed; as is the principle of deny all. Starting with all ports and protocols blocked leaves the organization in much more of a secure stance than simply blocking ports that are deemed dangerous or unneeded.

Read the rest of the excerpt in this PDF.

Excerpted from Certified Ethical Hacker Exam Prep by Michael Gregg (ISBN: 0789735318).

Copyright © 2006, Que Publishing. Reproduced by permission of Que Publishing. Visit Amazon.com for a detailed description and to learn how to purchase this title.

This was last published in April 2006

Dig Deeper on Networking Book Excerpts

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close