Networks are composed of two or more computers that share resources (such as printers and CDs), exchange files, and allow electronic communications.
https://www.infosectrain.com/blog/domain-4-of-ceh-v11-network-and-perimeter-hacking/
CEH v11
Network &
Perimeter Hacking
DOMAIN 4
www.infosectrain.com
www.infosectrain.com | sales@infosectrain.com
01
Domains of CEH
DOMAIN 1
Information Security &
Ethical Hacking Overview
DOMAIN 2
Reconnaissance
Techniques
DOMAIN 3
System hacking
phases
& Attack Techniques
DOMAIN 4
Network and perimeter
hacking
DOMAIN 5
Web application hacking
DOMAIN 6
Wireless network hacking
DOMAIN 7
Mobile platform, IoT,
& OT hacking
DOMAIN 8
Cloud Computing
DOMAIN 9
Cryptography
CEH v11
DOMAINS
6%
21%
17%
14%
16%
6%
8%
6%
6%
Network
Networks are composed of two or more computers that share resources (such
as printers and CDs), exchange files, and allow electronic communications.
A network of computers may be connected by cables, telephone lines, radio
waves, satellites, or infrared beams.
In simple terms, a network is a cluster of devices connected to each other by a
physical communication medium.
As I have mentioned above, a network is a collection of devices. Hence,
network hacking is nothing but gaining access to the information present on
all network devices over the internet.
DOMAIN 4
Network and Perimeter Hacking
www.infosectrain.com | sales@infosectrain.com
02
What is Network Hacking ?
In this blog, we will discuss the 4th domain of CEH,
which is ‘Network and Perimeter Hacking’
DOMAIN 4
Network and Perimeter Hacking
How are networks compromised?
www.infosectrain.com | sales@infosectrain.com
03
As every big plan starts with a simple step, likewise, large-scale cyber attacks
also start by attacking or infecting a lower-end device and increasing the
level of privileges required to go forward inside the same network. While
attacking the networks, ethical hackers will have to think exactly like
malicious hackers. Only then the organizations can have a clear idea of their
security vulnerabilities.
Attackers first start with the traditional methods. One of the most common
traditional methods is sending a false email. An attacker usually creates an
incorrect email by replicating it