O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 9

Trojans and Other Attacks

In this chapter you will

•  Describe malware types and their purpose

•  Identify malware deployment methods

•  Describe the malware analysis process

•  Identify malware countermeasures

•  Describe DoS attacks and techniques

•  Identify DoS detection and countermeasure action

•  Describe session hijacking and sequence prediction

My early memories, forged in the stomping grounds of my childhood upbringing in LA (Lower Alabama), most often revolve around fishing, hunting, camping, or blowing stuff up. Back then, fireworks were a wee bit stronger than they are now, parental supervision wasn’t, and we were encouraged to get out of the house to amuse ourselves and spare our mothers a little bit of sanity. And while ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required