en
Matt Walker

CEH Certified Ethical Hacker Practice Exams, Fourth Edition, 4th Edition

Повідомити про появу
Щоб читати цю книжку, завантажте файл EPUB або FB2 на Букмейт. Як завантажити книжку?
  • b7510226800цитує4 роки тому
    wrapper is used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
  • b7510226800цитує4 роки тому
    crypter is a software tool that uses a combination of encryption and code manipulation to render malware undetectable to AV and other security monitoring products
  • b7510226800цитує4 роки тому
    session splicing is an IDS evasion method.
  • b7510226800цитує4 роки тому
    Spyware is type of malware that covertly collects information about a user.
  • b7510226800цитує4 роки тому
    virus is a malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
  • b7510226800цитує4 роки тому
    worm is a self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
  • b7510226800цитує4 роки тому
    Trojan is a non-self-replicating
  • b7510226800цитує4 роки тому
    Aircrack is “an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack
  • b7510226800цитує4 роки тому
    Remember that the initialization vectors within WEP are relatively short (24 bits) and are reused frequently, so any attempt to crack the code requires, in general, around 15,000 or so packets.
  • b7510226800цитує4 роки тому
    Pivoting does refer to connecting to other machines from a compromised system, but is not accomplished with a pivot command.
fb2epub
Перетягніть файли сюди, не більш ніж 5 за один раз