Trojans and Other Attacks

In this chapter you will

•  Describe malware types and their purpose

•  Identify malware deployment methods

•  Describe the malware analysis process

•  Identify malware countermeasures

•  Describe DoS attacks and techniques

•  Identify DoS detection and countermeasure action

•  Describe session hijacking and sequence prediction

My early memories, forged in the stomping grounds of my childhood upbringing in LA (Lower Alabama), most often revolve around fishing, hunting, camping, or blowing stuff up. Back then, fireworks were a wee bit stronger than they are now, parental supervision wasn’t, and we were encouraged to get out of the house to amuse ourselves and spare our mothers a little bit of sanity. And ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.