wastedtime wrote: » I wouldn't expect to see stuff about 2008 and I agree there wasn't much but some stuff about 2003. The methodologies, and general information is what I felt was important from the CEH material. In my opinion the this tool or this particular flaw method for a entry level certification doesn't help you learn the key material for this level of exam.Also remember that because it is old, doesn't mean that it isn't still used. Personally the changes I would like to see in the CEH material would be less focus how many tools and more focus on the most common ones. Also a bit more into theory on how to attack/penetrate a network.
afcyung wrote: » The book I am reading is Copyrighted for 2010. Its a very recent book. While some of the tools still function and have their place what value is there in learning about vulnerabilities that no longer exist? To me its a waste of my time and I begin to wonder of the value of the cert.
-Foxer- wrote: » The problem is that most vulnerabilities are patched pretty quickly. I'm not sure why they decided to focus on NT4 privilege escalation, but even vulnerabilites in server 2003 will have been patched long before now. I guess I have mixed feelings. Part of me wished they had more up to date information, but I kind of understand why it wouldn't matter. A lot of the theory is pretty good though, even if things have changed since then. I think that's what they're trying to get across.
Bl8ckr0uter wrote: » Do you feel like you are a better network defender/attacker now?
afcyung wrote: » Is the C|EH discussing outdated material that is not relevant anymore? I dont know anyone using windows NT 4.0 SP3.
UnixGuy wrote: » Are there any recent books about pen-testing ? more updated, more practical and more comprehensive ?? Any recommendation will be useful...
RTmarc wrote: » I tend to think the data was a bit useless. Most of the vulnerabilities depend on unpatched legacy systems which are few and far between in active production environments. It also seemed like the magic formula for the method of attack was use XXXXX utility on YYYYY unpatched system. Nothing really into the actual architecture or engineerng behind an attack. The OSCP path looks a bit more interesting to me and more along the lines of what I'm interested in.