Chapter 2. The Technical Foundations of Hacking
This chapter covers the following topics:
The Hacking Process: An ethical hacker should understand the goals, motivations, and techniques used by hackers. Consider this phrase: The best way to beat hackers is to understand the way they think.
The Ethical Hacker’s Process: Although the process is similar to what’s used by hackers, there are key differences. One difference is that the ethical hacker operates with permission of the organization. Second, the ethical hacker’s ultimate goal is to secure systems.
Information Security Systems and the Stack: Many attacks are based on the misuse of the protocols that are part of the TCP/IP suite of protocols. Therefore, an ethical hacker should have a good ...
Get Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.