en
Matt Walker

CEH Certified Ethical Hacker Practice Exams, Fourth Edition, 4th Edition

Obavesti me kada knjiga bude dodata
Da biste čitali ovu knjigu otpremite EPUB ili FB2 datoteku na Bookmate. Kako da otpremim knjigu?
  • b7510226800je citiraoпре 4 године
    wrapper is used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
  • b7510226800je citiraoпре 4 године
    crypter is a software tool that uses a combination of encryption and code manipulation to render malware undetectable to AV and other security monitoring products
  • b7510226800je citiraoпре 4 године
    session splicing is an IDS evasion method.
  • b7510226800je citiraoпре 4 године
    Spyware is type of malware that covertly collects information about a user.
  • b7510226800je citiraoпре 4 године
    virus is a malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
  • b7510226800je citiraoпре 4 године
    worm is a self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
  • b7510226800je citiraoпре 4 године
    Trojan is a non-self-replicating
  • b7510226800je citiraoпре 4 године
    Aircrack is “an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack
  • b7510226800je citiraoпре 4 године
    Remember that the initialization vectors within WEP are relatively short (24 bits) and are reused frequently, so any attempt to crack the code requires, in general, around 15,000 or so packets.
  • b7510226800je citiraoпре 4 године
    Pivoting does refer to connecting to other machines from a compromised system, but is not accomplished with a pivot command.
fb2epub
Prevucite i otpustite datoteke (ne više od 5 odjednom)