Chapter 2. The Technical Foundations of Hacking

This chapter covers the following topics:

Image The Attackers Process: An ethical hacker should understand the goals, motivations, and techniques used by hackers. Just consider this phrase: The best way to beat hackers is to understand the way they think.

Image The Ethical Hackers Process: OSI is important because it is the basis for describing and explaining how many network services and attacks work.

Image Security ...

Get Certified Ethical Hacker (CEH) Cert Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.