Chapter 2. The Technical Foundations of Hacking

This chapter covers the following topics:

Image The Attackers Process: An ethical hacker should understand the goals, motivations, and techniques used by hackers. Just consider this phrase: The best way to beat hackers is to understand the way they think.

Image The Ethical Hackers Process: OSI is important because it is the basis for describing and explaining how many network services and attacks work.

Image Security ...

Get Certified Ethical Hacker (CEH) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.