Hacking
[CEH] Certified Ethical Hacker : Hacking Process
CEOinIRVINE
2008. 9. 21. 06:59
from book:
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking | |
John Wiley & Sons © 2008 |
active: just evastroping (like sniffing or monitoring)
passive: probes networks t get OS and available services)
Scanning
nmap
Nessues
nikto/wikto
Acutenix
AppScan
Acquiring Access
denial of service attacks, buffer overflow attacks, and application-based attacks
Maintaining Access
Covering tracks