R efe re n c e s
Exam 3 1 2 -5 0 C ertified Ethical H acker
M odule 01: Introduction to Ethical Hacking
1.
Zero-day attacks are meaner, more rampant than we ever thought, from http://arstechnica.com /security/ 2012/ 10 /zero-day-attacks-are-meaner-and-more-plentiful-thanthought/.
2.
SECURITY POLICY: TARGET, CONTENT, & LINKS, from http://csrc.nist.gov/nissc/1998/proceedings/paperG4.pdf. 3.
Anatomy of the Hack - Hands-on Security, from http://w ww.slideshare.net/NewBU/anatom y-of-thehack-handson-security-information-assurance-dub.
4.
Hacker methodology, from http://www.hackersecuritymeasures.com /.
5.
Ethical Hacking, from www.securedeath.com.
6.
C. C. Palmer, Ethical hacking from http://researchweb.w atson.ibm .com /journal/sj/403/palm er.htm l.
7.
An Overview of Computer Security, from www.cc.gatech.edu/classes/AY2005/cs4803cns_fall/security_overview.ppt. 8.
Dr. Death, (2006), Ethical Hacking, from http://w w w .securedeath.com .
9.
Ethical Hacking, from http://new order.box.sk/new s/921.
10.
How are Penetrating Testing conducted?, from www.corsaire.com.
11.
Ethical Hacking: The Security Justification Redux, from http://www.sosresearch.org/publications/ISTAS02ethicalhack.PDF. 12.
Ethical Hacking, from www.sosresearch.org/publications.
13.
Ethical Hacking, from www.research.ibm.com.
14.
Covering Tracks, from h ttp ://ro o tp ro m p t.o rg .
15.
Attack, from http://w w w .linuxsecurity.com /content/view /17/70/.
16.
Security Issues in Wireless MAGNET at Networj Layer, from http://csce.unl.edu/~jaljaroo/publications/TR02-10-07.pdf. 17.
Glossary of Security and Internet terms, from http://wssg.berkeley.edu/Securitylnfrastructure/glossary.html. 18.
Glossary of Vulnerability Testing Terminology, from http://w w w .ee.oulu.fi/research/ouspg/sage/glossary/.
19.
Information about
hackers, from h
Citations: Stephen Specht & Ruby Lee, (2003), from Taxonomies of Distributed Denial of Service Networks, Attacks ..., from David Dittrich, (1999), The DoS Project 's "trinoo" distributed denial of service attack tool from h ttp://w w w .donkboy.com /htm l/stuff.htm . David Moore Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas, (2003), Weaver Inside the Slammer Worm, from David Dittrich, (1999), Trinoo Analysis, from http://staff.washington.edu/dittrich/m isc/trinoo.analysis. John Michalski, Carrie Price, Eric Stanton, Erik Lee, CHUA, Kuan Seah, Wong, Yip Heng and TAN, and Chung Pheng, (2002), DYNAT TECHNOLOGIES ASSESSMENT REPORT, from Jason Barlow and Woody Thrower, (2000), TFN2K - An Analysis Jason Barlow and Woody Thrower AXENT Security..., from http://packetst 0 rmsecurity.0 rg/distributed/TFN 2k_Analysis-l.3 .tx t. Jason Barlow and Woody Thrower, (2000), TFN2K - An Analysis (Revision : 1.3), from http://www.sym antec.com /avcenter/security/Content/2000_02_10_a.htm l. 1100 . Gary C. Kessler, (2000), Distributed Denial-Of-Service, from http://w w w .garykessler.net/library/ddos.htm l.