O'Reilly logo

Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. The Technical Foundations of Hacking

This chapter covers the following topics:

Image The Attackers Process: An ethical hacker should understand the goals, motivations, and techniques used by hackers. Just consider this phrase: The best way to beat hackers is to understand the way they think.

Image The Ethical Hacker’s Process: The OSI model is important because it is the basis for describing and explaining how many network services and attacks work.

Security and the Stack: Many attacks are based on the misuse of the protocols that are part of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required