Chapter 2. The Technical Foundations of Hacking
This chapter covers the following topics:
The Attackers Process: An ethical hacker should understand the goals, motivations, and techniques used by hackers. Just consider this phrase: The best way to beat hackers is to understand the way they think.
The Ethical Hackers Process: OSI is important because it is the basis for describing and explaining how many network services and attacks work.
Get Certified Ethical Hacker (CEH) Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.