O'Reilly logo

Certified Ethical Hacker (CEH) Version 10 Cert Guide, Third Edition by Michael Gregg, Omar Santos

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. The Technical Foundations of Hacking

This chapter covers the following topics:

The Hacking Process: An ethical hacker should understand the goals, motivations, and techniques used by hackers. Consider this phrase: The best way to beat hackers is to understand the way they think.

The Ethical Hacker’s Process: Although the process is similar to what’s used by hackers, there are key differences. One difference is that the ethical hacker operates with permission of the organization. Second, the ethical hacker’s ultimate goal is to secure systems.

Information Security Systems and the Stack: Many attacks are based on the misuse of the protocols that are part of the TCP/IP suite of protocols. Therefore, an ethical hacker should have ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required