Chapter 2. The Technical Foundations of Hacking

This chapter covers the following topics:

Image The Attackers Process: An ethical hacker should understand the goals, motivations, and techniques used by hackers. Just consider this phrase: The best way to beat hackers is to understand the way they think.

Image The Ethical Hacker’s Process: The OSI model is important because it is the basis for describing and explaining how many network services and attacks work.

Security and the Stack: Many attacks are based on the misuse of the protocols that are part of ...

Get Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.