Professional Documents
Culture Documents
(Download PDF) Cehv9 Certified Ethical Hacker Version 9 Oriyano 2 Online Ebook All Chapter PDF
(Download PDF) Cehv9 Certified Ethical Hacker Version 9 Oriyano 2 Online Ebook All Chapter PDF
9 Oriyano
Visit to download the full and correct content document:
https://textbookfull.com/product/cehv9-certified-ethical-hacker-version-9-oriyano-2/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
https://textbookfull.com/product/cehv9-certified-ethical-hacker-
version-9-oriyano-2/
https://textbookfull.com/product/certified-ethical-hacker-ceh-
version-10-cert-guide-michael-gregg/
https://textbookfull.com/product/ceh-certified-ethical-hacker-
exam-guide-matt-walker/
https://textbookfull.com/product/ceh-certified-ethical-hacker-
bundle-third-edition-walker/
Certified Ethical Hacker CEH Exam Cram 1st Edition
Easttom Ii
https://textbookfull.com/product/certified-ethical-hacker-ceh-
exam-cram-1st-edition-easttom-ii/
https://textbookfull.com/product/ceh-v10-certified-ethical-
hacker-study-guide-1st-edition-ric-messier/
https://textbookfull.com/product/certified-ethical-hacker-ceh-
exam-cram-1st-edition-william-chuck-easttom/
https://textbookfull.com/product/certified-ethical-hacker-ceh-
foundation-guide-1st-edition-sagar-ajay-rahalkar-auth/
https://textbookfull.com/product/ceh-certified-ethical-hacker-
all-in-one-exam-guide-fourth-edition-4th-edition-walker/
CEH™ Certified Ethical Hacker
Study Guide
Version 9
Sean-Philip Oriyano
Development Editor: Kim Wimpsett
Technical Editors: Raymond Blockmon, Jason McDowell, Tom Updegrove
Production Editor: Rebecca Anderson
Copy Editor: Linda Recktenwald
Editorial Manager: Mary Beth Wakefield
Production Manager: Kathleen Wisor
Executive Editor: Jim Minatel
Media Supervising Producer: Rich Graves
Book Designers: Judy Fung and Bill Gibson
Proofreader: Nancy Carrasco
Indexer: J & J Indexing
Project Coordinator, Cover: Brent Savage
Cover Designer: Wiley
Cover Image: ©Getty Images Inc./Jeremy Woodhouse
Copyright © 2016 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-119-25224-5
ISBN: 978-1-119-25227-6 (ebk.)
ISBN: 978-1-119-25225-2 (ebk.)
Manufactured in the United States of America
No part of this publication may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, mechanical, photocopying,
recording, scanning or otherwise, except as permitted under Sections 107 or 108 of
the 1976 United States Copyright Act, without either the prior written permission
of the Publisher, or authorization through payment of the appropriate per-copy fee
to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923,
(978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission
should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111
River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at
http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no
representations or warranties with respect to the accuracy or completeness of the
contents of this work and specifically disclaim all warranties, including without
limitation warranties of fitness for a particular purpose. No warranty may be
created or extended by sales or promotional materials. The advice and strategies
contained herein may not be suitable for every situation. This work is sold with the
understanding that the publisher is not engaged in rendering legal, accounting, or
other professional services. If professional assistance is required, the services of a
competent professional person should be sought. Neither the publisher nor the
author shall be liable for damages arising herefrom. The fact that an organization
or Web site is referred to in this work as a citation and/or a potential source of
further information does not mean that the author or the publisher endorses the
information the organization or Web site may provide or recommendations it may
make. Further, readers should be aware that Internet Web sites listed in this work
may have changed or disappeared between when this work was written and when it
is read.
For general information on our other products and services or to obtain technical
support, please contact our Customer Care Department within the U.S. at (877)
762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-
demand. Some material included with standard print versions of this book may not
be included in e-books or in print-on-demand. If this book refers to media such as
a CD or DVD that is not included in the version you purchased, you may download
this material at http://booksupport.wiley.com. For more information about Wiley
products, visit www.wiley.com.
Library of Congress Control Number: 2016934529
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or
registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United
States and other countries, and may not be used without written permission. CEH
is a trademark of EC-Council. All other trademarks are the property of their
respective owners. John Wiley & Sons, Inc. is not associated with any product or
vendor mentioned in this book.
I would like to dedicate this book to Medal of Honor recipient (and
personal hero) Sgt. Maj. (USA) Jon R. Cavaiani, who passed away
some time before this book was written. Thank you for giving me
the honor to shake your hand.
Acknowledgments
Writing acknowledgements is probably the toughest part of writing a
book in my opinion as I always feel that I have forgotten someone
who had to deal with my hijinks over the past few months. Anyway,
here goes.
First of all, I want to thank my Mom and Dad for all of your support
over the years as well as being your favorite son. That’s right, I said
it.
I would also like to take a moment to thank all the men and women I
have served with over the years. It is an honor for this Chief Warrant
Officer to serve with each of you. I would also like to extend a special
thanks to my own unit for all the work you do, you are each a credit
to the uniform. Finally, thanks to my Commander for your
mentorship, support, and faith in my abilities.
To my friends I want to say thanks for tearing me away from my
computer now and then when you knew I needed to let my brain cool
off a bit. Mark, Jason, Jennifer, Fred, Misty, Arnold, Shelly, and
especially Lisa, you all helped me put my focus elsewhere for a while
before I went crazy(er).
I would also like to thank Shigeru Miyamoto for bringing the Legend
of Zelda into reality.
Finally, on a more serious note, I would like to dedicate this book to
Medal of Honor recipient (and personal hero) Sgt. Maj. (USA) Jon R.
Cavaiani who passed away some time before this book was written.
Thank you for giving me the honor to shake your hand.
—Sean-Philip Oriyano
Duty, Service, Honor
About the Author
Sean Oriyano (www.oriyano.com) is a seasoned security
professional and entrepreneur. Over the past 25 years he has split his
time among writing, researching, consulting, and training various
people and organizations on a wide range of topics relating to both
IT and security. As an instructor and consultant, Sean has traveled
all over the world, sharing his knowledge as well as gaining exposure
to many different environments and cultures along the way. His
broad knowledge and easy-to-understand manner, along with a
healthy dose of humor, have led to Sean being a regularly requested
instructor.
Outside of training and consulting, Sean is also a best-selling author
with many years of experience in both digital and print media. Sean
has published books for McGraw-Hill, Wiley, Sybex, O’Reilly Media,
and Jones & Bartlett. Over the last decade Sean has expanded his
reach even further by appearing in shows on both TV and radio. To
date, Sean has appeared in over a dozen TV programs and radio
shows discussing various cybersecurity topics and technologies.
When in front of the camera, Sean has been noted for his casual
demeanor and praised for his ability to explain complex topics in an
easy-to-understand manner.
Outside his own business activities, Sean is a member of the military
as a chief warrant officer specializing in infrastructure and security
as well as the development of new troops. In addition, as a CWO he is
recognized as a subject matter expert in his field and is frequently
called upon to provide expertise, training, and mentoring wherever
needed.
When not working, Sean is an avid obstacle course racer, having
completed numerous races, including a world championship race
and a Spartan Trifecta. He also enjoys traveling, bodybuilding,
training, and developing his mixed martial arts skills plus taking
survival courses.
Sean holds many certifications and qualifications that demonstrate
his knowledge and experience in the IT field, such as the CISSP,
CNDA, and Security+.
CONTENTS
Introduction
Exam 312-50 Exam Objectives
Assessment Test
Answers to Assessment Test
Chapter 1: Introduction to Ethical Hacking
Hacking: the Evolution
So, What Is an Ethical Hacker?
Summary
Exam Essentials
Review Questions
Chapter 2: System Fundamentals
Exploring Network Topologies
Working with the Open Systems Interconnection Model
Dissecting the TCP/IP Suite
IP Subnetting
Hexadecimal vs. Binary
Exploring TCP/IP Ports
Understanding Network Devices
Working with MAC Addresses
Intrusion Prevention and Intrusion Detection Systems
Network Security
Knowing Operating Systems
Backups and Archiving
Summary
Exam Essentials
Review Questions
Chapter 3: Cryptography
Cryptography: Early Applications and Examples
Cryptography in Action
Understanding Hashing
Issues with Cryptography
Applications of Cryptography
Summary
Exam Essentials
Review Questions
Chapter 4: Footprinting
Understanding the Steps of Ethical Hacking
What Is Footprinting?
Terminology in Footprinting
Threats Introduced by Footprinting
The Footprinting Process
Summary
Exam Essentials
Review Questions
Chapter 5: Scanning
What Is Scanning?
Checking for Live Systems
Checking the Status of Ports
The Family Tree of Scans
OS Fingerprinting
Countermeasures
Vulnerability Scanning
Mapping the Network
Using Proxies
Summary
Exam Essentials
Review Questions
Chapter 6: Enumeration
A Quick Review
What Is Enumeration?
About Windows Enumeration
Linux Basic
Enumeration with SNMP
Unix and Linux Enumeration
LDAP and Directory Service Enumeration
Enumeration Using NTP
SMTP Enumeration
Summary
Exam Essentials
Review Questions
Chapter 7: System Hacking
Up to This Point
System Hacking
Summary
Exam Essentials
Review Questions
Chapter 8: Malware
Malware
Overt and Covert Channels
Summary
Exam Essentials
Review Questions
Chapter 9: Sniffers
Understanding Sniffers
Using a Sniffer
Switched Network Sniffing
Summary
Exam Essentials
Review Questions
Chapter 10: Social Engineering
What Is Social Engineering?
Social Networking to Gather Information?
Commonly Employed Threats
Identity Theft
Summary
Exam Essentials
Review Questions
Chapter 11: Denial of Service
Understanding DoS
Understanding DDoS
DoS Tools
DDoS Tools
DoS Defensive Strategies
DoS Pen-Testing Considerations
Summary
Exam Essentials
Review Questions
Chapter 12: Session Hijacking
Understanding Session Hijacking
Exploring Defensive Strategies
Summary
Exam Essentials
Review Questions
Chapter 13: Web Servers and Applications
Exploring the Client-Server Relationship
Summary
Exam Essentials
Review Questions
Chapter 14: SQL Injection
Introducing SQL Injection
Summary
Exam Essentials
Review Questions
Chapter 15: Hacking Wi-Fi and Bluetooth
What Is a Wireless Network?
Summary
Exam Essentials
Review Questions
Chapter 16: Mobile Device Security
Mobile OS Models and Architectures
Goals of Mobile Security
Device Security Models
Countermeasures
Summary
Exam Essentials
Review Questions
Chapter 17: Evasion
Honeypots, IDSs, and Firewalls
Summary
Exam Essentials
Review Questions
Chapter 18: Cloud Technologies and Security
What Is the Cloud?
Summary
Exam Essentials
Review Questions
Chapter 19: Physical Security
Introducing Physical Security
Summary
Exam Essentials
Review Questions
Appendix A: Answers to Review Questions
Chapter 1: Introduction to Ethical Hacking
Chapter 2: System Fundamentals
Chapter 3: Cryptography
Chapter 4: Footprinting
Chapter 5: Scanning
Chapter 6: Enumeration
Chapter 7: System Hacking
Chapter 8: Malware
Chapter 9: Sniffers
Chapter 10: Social Engineering
Chapter 11: Denial of Service
Chapter 12: Session Hijacking
Chapter 13: Web Servers and Applications
Chapter 14: SQL Injection
Chapter 15: Hacking Wi-Fi and Bluetooth
Chapter 16: Mobile Device Security
Chapter 17: Evasion
Chapter 18: Cloud Technologies and Security
Chapter 19: Physical Security
Appendix B: Penetration Testing Frameworks
Overview of Alternative Methods
Penetration Testing Execution Standard
Summary
Appendix C: Building a Lab
Why Build a Lab?
Creating a Test Setup
The Installation Process
Summary
Advert
EULA
List of Tables
Chapter 1
Table 1.1
Table 1.2
Table 1.3
Chapter 2
Table 2.1
Table 2.2
Table 2.3
Chapter 3
Table 3.1
Chapter 5
Table 5.1
Table 5.2
Table 5.3
Table 5.4
Chapter 9
Table 9.1
Table 9.2
Table 9.3
Chapter 12
Table 12.1
Chapter 15
Table 15.1
Table 15.2
List of Illustrations
Chapter 1
Figure 1.1 Security versus convenience analysis
Figure 1.2 The hacking process
Chapter 2
Figure 2.1 Bus topology
Figure 2.2 Ring topology
Figure 2.3 Star topology
Figure 2.4 Mesh topology
Figure 2.5 Hybrid topology
Figure 2.6 OSI TCP/IP comparative model
Figure 2.7 TCP three-way handshake
Figure 2.8 TCP sequencing
Figure 2.9 Residential network setup
Figure 2.10 Typical enterprise network
Chapter 3
Figure 3.1 The Rosetta stone
Figure 3.2 Symmetric encryption
Figure 3.3 Asymmetric encryption
Figure 3.4 A digital signature in use
Figure 3.5 The PKI ecosystem
Figure 3.6 Hash generated from “Hello World” using MD5
When answering multiple-choice questions about which you’re
unsure, use a process of elimination to get rid of the obviously
incorrect answers first. Doing so will improve your odds if you
need to make an educated guess.
On form-based tests (nonadaptive), because the hard questions
will take the most time, save them for last. You can move forward
and backward through the exam.
For the latest pricing on the exams and updates to the
registration procedures, visit the EC-Council’s website at
www.eccouncil.org/certification.
Souvent un frein, quelque faible qu’il soit, suffit pour arrêter au milieu
de sa course un destrier fougueux ; mais il est rare que le mors de la
raison arrête la furie libidineuse, quand elle a le plaisir en
perspective. De même, l’ours ne se laisse pas facilement détourner
du miel, dès que le parfum lui en est venu au nez, ou qu’il en a léché
quelques gouttes.
Quelle raison pourrait refréner le bon Roger, alors qu’il veut jouir
de la gentille Angélique qu’il tient nue dans un bois solitaire et
propice ? Il ne lui souvient plus de Bradamante, qui seule lui tenait
naguère tant au cœur ; ou s’il lui en souvient, il se croirait fou de ne
pas apprécier et estimer aussi celle-là.
En pareille circonstance, l’austère Zénocrate n’aurait pas agi
avec plus de continence que lui. Roger avait jeté la lance et l’écu, et
il ôtait impatiemment le reste de ses armes, lorsque la dame,
abaissant pudiquement ses yeux sur son beau corps nu, vit à son
doigt l’anneau que Brunel lui avait enlevé jadis dans Albracca.
C’est l’anneau qu’elle porta autrefois en France, la première fois
qu’elle en prit le chemin avec son frère, possesseur de la lance,
tombée par la suite au pouvoir du paladin Astolphe. C’est avec lui
qu’elle déjoua les enchantements de Maugis [59] dans la caverne de
Merlin, avec lui qu’elle délivra un matin Roland et d’autres
chevaliers, tenus en servitude par Dragontine [60] .
Grâce à lui, elle sortit invisible de la tour où l’avait enfermée un
méchant vieillard. Mais pourquoi vais-je rappeler toutes ces choses,
puisque vous les savez aussi bien que moi ? Brunel, jusque dans sa
propre demeure, vint lui ravir l’anneau qu’Agramant désirait
posséder. Depuis, elle avait eu constamment la fortune contre elle,
et finalement elle avait perdu son royaume.
Maintenant qu’elle se le voit en main, comme je l’ai dit, elle se
sent tellement saisir de stupeur et d’allégresse, que, comme si elle
craignait d’être en proie à un songe vain, elle en croit à peine à ses
yeux, à sa main. Elle l’enlève de son doigt, et après l’avoir tenu dans
chacune de ses mains, elle le met dans sa bouche. En moins de
temps qu’un éclair, elle disparaît aux yeux de Roger, comme le soleil
quand un nuage le voile.
Cependant Roger regardait tout autour de lui, et tournait comme
un fou. Mais se rappelant soudain l’anneau, il resta confus et
stupéfait, maudissant son inadvertance et accusant la dame d’avoir
payé par cet acte d’ingratitude et de déloyauté le secours qu’elle
avait eu de lui.
« — Ingrate damoiselle — disait-il — voilà le prix de mes
services ! tu aimes mieux voler l’anneau que de le recevoir en don ?
Pourquoi ne te l’aurais-je pas donné ? Je t’aurais donné non
seulement l’anneau, mais l’écu et le destrier ailé et moi-même. Tu
peux disposer de moi comme tu veux, pourvu que tu ne me caches
pas ton beau visage. Tu m’entends, cruelle, je le sais, et tu ne
réponds pas. — »
Ainsi disant, il s’en allait autour de la fontaine, les bras étendus,
comme un aveugle. Oh ! combien de fois il embrassa l’air fluide,
espérant embrasser en même temps la donzelle ! Celle-ci s’était
déjà éloignée ; mais elle ne cessa de marcher jusqu’à ce qu’elle fût
arrivée à une caverne qui, sous une montagne, s’ouvrait vaste et
large, et où elle trouva les aliments dont elle avait besoin.
Là, habitait un vieux berger qui avait un nombreux troupeau de
cavales. Les juments paissaient, au fond de la vallée, les herbes
tendres, autour des frais ruisseaux. De chaque côté de la caverne,
étaient des stalles où l’on pouvait fuir le soleil de midi. Angélique,
sans se laisser encore voir, s’y reposa longtemps.
Et, sur le soir, à la fraîcheur, se sentant assez reposée, elle
s’enveloppa d’un drap grossier, bien différent des vêtements gais,
aux couleurs vertes, jaunes, bleues, azurées ou rouges, de toutes
les couleurs imaginables enfin, qu’elle avait l’habitude de porter.
Cette humble enveloppe ne peut cependant l’empêcher de
ressembler à une belle et noble dame.
Qu’il se taise, celui qui loue Philis, ou Nérée, ou Amaryllis, ou
Galatée qui fuit. O Tityre et Mélibée, avec votre permission, aucune
d’elles ne l’égalait en beauté. La belle dame prit, parmi le troupeau
de juments, celle qui lui convint le plus. Alors lui revint plus vivace le
désir de retourner en Orient.
Pendant ce temps, Roger, après avoir cherché pendant
longtemps en vain dans l’espoir de découvrir Angélique,
s’apercevant enfin de son erreur et qu’elle s’était éloignée et ne
l’entendait plus, était retourné à l’endroit où il avait laissé son cheval,
pensant reprendre son voyage au ciel et sur terre. Mais il se trouva
que le cheval, s’étant débarrassé du mors, s’élevait dans les airs en
pleine liberté.
Roger fut très affecté, après sa déception, de se voir encore
séparé du cheval-oiseau. Cette nouvelle mésaventure, non moins
que la tromperie de femme dont il a été victime, lui oppresse le
cœur. Mais ce qui lui pèse plus que l’une et l’autre, et ce dont il
éprouve un sérieux ennui, c’est d’avoir perdu le précieux anneau,