en
Matt Walker

CEH Certified Ethical Hacker Practice Exams, Fourth Edition, 4th Edition

Benachrichtigen, wenn das Buch hinzugefügt wird
Um dieses Buch zu lesen laden Sie eine EPUB- oder FB2-Datei zu Bookmate hoch. Wie lade ich ein Buch hoch?
  • b7510226800hat Zitat gemachtvor 4 Jahren
    wrapper is used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
  • b7510226800hat Zitat gemachtvor 4 Jahren
    crypter is a software tool that uses a combination of encryption and code manipulation to render malware undetectable to AV and other security monitoring products
  • b7510226800hat Zitat gemachtvor 4 Jahren
    session splicing is an IDS evasion method.
  • b7510226800hat Zitat gemachtvor 4 Jahren
    Spyware is type of malware that covertly collects information about a user.
  • b7510226800hat Zitat gemachtvor 4 Jahren
    virus is a malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
  • b7510226800hat Zitat gemachtvor 4 Jahren
    worm is a self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
  • b7510226800hat Zitat gemachtvor 4 Jahren
    Trojan is a non-self-replicating
  • b7510226800hat Zitat gemachtvor 4 Jahren
    Aircrack is “an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack
  • b7510226800hat Zitat gemachtvor 4 Jahren
    Remember that the initialization vectors within WEP are relatively short (24 bits) and are reused frequently, so any attempt to crack the code requires, in general, around 15,000 or so packets.
  • b7510226800hat Zitat gemachtvor 4 Jahren
    Pivoting does refer to connecting to other machines from a compromised system, but is not accomplished with a pivot command.
fb2epub
Ziehen Sie Ihre Dateien herüber (nicht mehr als fünf auf einmal)