Book Image

CEH v10 Certified Ethical Hacker Study Guide

By : Ric Messier
Book Image

CEH v10 Certified Ethical Hacker Study Guide

By: Ric Messier

Overview of this book

As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep a track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. By the end of the book, you’ll have all the information and knowledge you need to pass this test with flying colors
Table of Contents (23 chapters)
Free Chapter
About the Author
Assessment Test
Answers to Assessment Test
Comprehensive Online Learning Environment
End User License Agreement

Service Enumeration

When you are scanning systems, nmap is always your friend. The same is true when it comes to service enumeration. This means you are identifying the service running on the target system. A quick way to do that is to use the version scan built into nmap. In the following code listing, you can see a portion of output from a version scan run by nmap on hosts on my network. A version scan is performed by using -sV as the parameter sent to nmap. It shows not just open ports but also, where it can find them, specifics about the services and versions that are running on the hosts that were found responding on the network. It does this by looking at any application banners to extract details about the service name and version.

Nmap Version Scan

22/tcp  open   ssh     OpenSSH 7.7p1 Debian 3 (protocol 2.0)
25/tcp  closed smtp
80/tcp  open   http    Greenbone Security Assistant
443/tcp closed https
MAC Address: 0E:76:03:B8:2A:BA (Unknown)