Trojans and Other Attacks

In this chapter you will

•  Describe malware types and their purpose

•  Identify malware deployment methods

•  Describe the malware analysis process

•  Identify malware countermeasures

•  Describe DoS attacks and techniques

•  Identify DoS detection and countermeasure action

•  Describe session hijacking and sequence prediction

My early memories, forged in the stomping grounds of my childhood upbringing in LA (Lower Alabama), most often revolve around fishing, hunting, camping, or blowing stuff up. Back then, fireworks were a wee bit stronger than they are now, parental supervision wasn’t, and we were encouraged to get out of the house to amuse ourselves and spare our mothers a little bit of sanity. And while ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.