-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
CEH v10 Certified Ethical Hacker Study Guide
By :
THE FOLLOWING CEH EXAM TOPICS ARE COVERED IN THIS CHAPTER:
Vulnerabilities
Exploit tools
Programming languages
Operating environments
Verification procedures
Technical assessment methods
This is where we get to what many people think is what “hacking,” or penetration testing, is all about. Certainly system hacking is an important element, since it’s where you demonstrate that the vulnerabilities actually exist, but it’s not the only one. Penetration testing, or ethical hacking, isn’t just about breaking into systems—looting and pillaging. Keep in mind that the objective is always to help organizations improve their security posture. Exploiting vulnerabilities to gain access to systems is one way of doing that. Breaking into a system demonstrates the existence of the vulnerability, and it also provides potential pathways to other systems.
With the end goal...
Change the font size
Change margin width
Change background colour