O'Reilly logo

Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Cloud Computing and Botnets

This chapter covers the following topics:

Image Cloud Computing: Although not specifically designed to be hacking tools, sniffers can be used to find many types of clear-text network traffic.

Image Botnets: This general class of tools and techniques can be used for denial of service, fake pharmaceuticals, fake goods, illegal software, bootleg music, or even potentially extortion.

This chapter introduces you to cloud computing and botnets. Cloud computing is a new consumption and delivery model for IT services. The ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required