CEH [4 of 5] Ethical Hacking and Countermeasures: Linux, Macintosh & Mobile Systems

Linux, Macintosh and Mobile Systems discusses techniques used in hacking: Linux, Macintosh, routers, cable modems, firewalls, mobile devices, Bluetooth devices, RFID and USB devices and how to determine security polices for these devices.

Chapter 1, Linux Hacking, looks into various aspects of security related to Linux including rootkits and intrusion detection systems. 

Chapter 2, Mac OS X Hacking, introduces some of the features of Mac OS X and then discusses vulnerabilities that affect the operating system. 

Chapter 3, Hacking Routers, Cable Modems, and Firewalls, discusses how particularly vulnerable these devices are to hackers and how these vulnerabilities are essential factors in determining security policies for both businesses and households. 

Chapter 4, Hacking Mobile Phones, PDAs and Handheld Devices, includes a discussion the different types of handheld devices investigators have to be aware of and the vulnerabilities present in the different devices. 

Chapter 5, Bluetooth Hacking, explains the types of attacks hackers make against Bluetooth-enabled devices as well as the tools that make Bluetooth more secure. 

Chapter 6, RFID Hacking, presents a general overview of RFID technology, discusses RFID collisions and the risks associated with implementing RFID systems, and concludes with enumerating the RFID security controls. 

Chapter 7, Hacking USB Devices, explains USB devices and how they work. It also covers tools that hackers used to attack USB devices and the tools that administrators can use to secure these devices.