Table of Contents:
- The business and legal issues of ethical hacking
- Introduction to hacking
- Ethics and legality
- Penetration testing for business
- The pre-attack phases
- Footprinting
- Scanning
- Enumerating
- Attack techniques and tools
- System hacking techniques
- Trojans, backdoors, and sniffers
- Denial of service attacks and session hijacking
- Penetration testing steps
- Linus hacking tools
- Social engineering and physical security
- Web server and database attacks
- Web server hacking and Web application vulnerabilities
- SQL injection vulnerabilities
- Cryptography
- Cracking Web passwords
- Advanced topics
- Wireless network attacks and countermeasures
- Firewalls, intrusion detection systems and honeypots
- Viruses, worms, and buffer overflows
- Answers to sample questions
- Glossary of terms and acronyms
- What's on the CD.


