Code Monkey home page Code Monkey logo

ceh-in-bullet-points's Introduction

Certified ethical hacker in bullet points

Quality checks status GitHub sponsors

  • This repo contains study notes for Certified Ethical Hacker exam.
  • The notes are comprehensive and written with goal of covering all exam areas.
  • It includes many real-life tips and tricks to keep practical value in the content.
  • Combines and summarizes a lot of education materials from many different sources.
    • I passed the exam with 119/125 score with these notes.
  • πŸ’‘ A good way is using material is using the search function extensively, there are many cross references throughout the material to help you navigate, feel free to ignore them if you're reading for the first time.
  • Good luck & enjoy studying! β˜•
  • ✨ Contributions of any kind are welcome!

Symbols

  • There are some symbols used throughout the documentation:

    Symbol Description
    πŸ’‘ Best practice or practical tips
    ❗ An important limitation, challenge or an exception
    πŸ“ Common exam area
    πŸ€— Fact / trivia (most likely unrelated to the exam)

Content

  1. Introduction
    1. Information security
      1. Information security overview
      2. Security threats and attacks
      3. Information security controls
        1. Information security controls overview
        2. Risk management
        3. Incident management
        4. Network security
        5. Security policies
        6. Physical security
        7. Data leakage backup and recovery
        8. Identity access management (IAM)
      4. Threat intelligence and forensics
      5. Laws, standards and regulations
    2. Hacking
      1. Hacker types
      2. Hacking stages
    3. Penetration testing
      1. Penetration testing overview
      2. Penetration testing phases
  2. Footprinting
    1. Footprinting overview
    2. Search engines and online resources
    3. WHOIS, GeoIpLocation and DNS interrogation
    4. Email footprinting
    5. Website footprinting
    6. Network footprinting
  3. Scanning networks
    1. Scanning networks overview
    2. TCP/IP basics
    3. Scanning tools
    4. Scanning techniques
    5. Bypassing IDS and firewall
    6. Banner grabbing
  4. Enumeration
    1. Enumeration Overview
    2. DNS enumeration
  5. Vulnerabilities
    1. Vulnerability analysis
    2. Common vulnerabilities
    3. Automated penetration testing tools
  6. System hacking
    1. Cracking passwords
      1. Cracking passwords overview
      2. Microsoft authentication
      3. Password cracking tools
    2. Linux basics
    3. Escalating privileges
    4. Executing applications
    5. Hiding files
    6. Covering tracks
  7. Malware overview
    1. Malware overview
    2. Trojans
    3. Viruses
    4. Malware analysis
  8. Sniffing
    1. Sniffing overview
    2. Sniffing tools
    3. Sniffing attacks
      1. Sniffing attacks overview
      2. Spoofing attacks
      3. ARP poisoning
  9. Wireless networks
    1. Wireless networks overview
    2. AAA protocols
    3. Wireless threats and attacks
    4. Wireless security tools
    5. Bluetooth
  10. Social engineering
    1. Social engineering overview
    2. Social engineering types
  11. Firewalls IDS and Honeypots
    1. Intrusion detection system (IDS)
      1. Intrusion detection system (IDS) overview
      2. Evading IDS
    2. Firewall
      1. Firewall overview
      2. Evading firewalls
    3. Honeypot
  12. Web servers
    1. Hacking web servers
    2. Web server threats and attacks
  13. Web applications
    1. Hacking web applications
    2. OWASP top 10 threats
    3. Denial of service
    4. Session hijacking
  14. SQL injection
    1. SQL injection overview
    2. SQL injection types
  15. Cryptography
    1. Cryptography overview
    2. Encryption algorithms
    3. Hashing algorithms
    4. Communication
      1. Encrypting communication
      2. Tunneling protocols
    5. Encrypting disk
    6. Cryptanalysis
  16. Cloud
    1. Cloud computing
    2. Cloud security
    3. Container security
  17. Mobile platforms
    1. Mobile hacking
    2. Mobile attack vectors
    3. Mobile attacks
  18. IoT and OT
    1. IoT overview
    2. IoT security
  19. Exam readiness

↑

Support

  • ⭐️ Simplest way to say thanks is just to it a star 🀩
  • ❀️ To show more support:
  • ✨ Contributions of any kind are welcome!

↑

ceh-in-bullet-points's People

Contributors

anirudhkk avatar brimford avatar salem73616c656d avatar undergroundwires avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

ceh-in-bullet-points's Issues

ARP poisoning attack steps

I think in the line "e.g. through host discovery using nmap e.g. nmap -sn 192.168.0.0" the Nmap scan is missing /16

IoT Architecture Layers

IoT Architecture Layers have a different structure in the v11 book (No mention to business layer there, instead Access Gateway Layer is defined). This is often included in exam prep questions; Usually a definition is given and a name is required.

5 Layers of IoT Architecture are:

Edge Technology Layer
This layer consists of all the hardware components, including sensors, radio-frequency identification (RFID) tags, readers, or other soft sensors, and the device itself. These entities are the primary part of the data sensors that are deployed in the field for monitoring or sensing various phenomena. This layer plays an important part in data collection, and in connecting devices within the network and with the server.

Access Gateway Layer
This layer helps to bridge the gap between two endpoints, such as a device and a client. The initial data handling also takes place in this layer. This layer carries out message routing, message identification, and subscribing.

Internet Layer
This is a crucial layer as it serves as the main component in carrying out communication between two endpoints, such as device-to-device, device-to-cloud, device-to-gateway, or back-end data sharing.

Middleware Layer
This is one of the most critical layers that operates in two-way mode. As the name suggests, this layer sits in the middle of the application layer and the hardware layer, thus behaving as an interface between these two layers. It is responsible for important functions such as data management, device management, and various issues like data analysis, data aggregation, data filtering, device information discovery, and access control.

Application Layer
This layer, placed at the top of the stack, is responsible for the delivery of services to the relevant users from different sectors, including building, industrial, manufacturing, automobile, security, healthcare, etc.

Small Typo

/07-malware/trojans.md

Line 123

  • software that's intend t find it
  • software that's intended to find it

help

hey thanks for developing it can you help me by sending a video tutorial how to use it?

Security Threats and Attacks

1.i.b Discusses OS attacks. One line states that unpatched operating systems can allow for zero days. If they are vulnerable due to a known issue that has a patch, it is not a zero day. Clarification is necessary to avoid confusion for new learners.

Reader-friendly modifications - help needed ?

Thanks for your effort!
However it's not very reader-friendly - have you thought about using any docs system for your project ? (with reading mode, etc ?).
Would you like your repo to be converted into reader-friendly site? (I thought about mkdocs with material).
This would adding indexes to files & commiting some code from mkdocs. Here is example screenshot of what I tried locally.

Note the features:

  • index on the left (unordered due to alphabetical sorting)
  • chapters on the right
  • page changes on the bottom

Please let me know if I should start working on it.
Then you can publish it on github pages & everyone can look at it in more reader-friendly mode.

image

Denial of Service / RST Attack

I think the sentence "Computer B in that case can send RST packet to computer B." needs to be reviewed. Author probably meant "to computer A"

Scanning Networks / Banner Grabbing - Nmap syntax

In Banner Grabbing Tools sections says:
"nmap -0 for OS automatic fingerprinting" but I think it should be "nmap -O " according to Nmap.org.

It could be a silly thing that has to do with github font or my browser (if so, I'm sorry for bringing this up) but might generate some confusion for newbies like me.
Thanks for the resources!

just a small fix

Thank you for that awesome repo!

03-scanning-networks/scanning-networks-overview.md

  • IP supports more addresses should be:
  • IPv6 supports more addresses (than IPv4)

Cloud attacks addition: Cloud Hopper and Cloudborne

In Cloud attacks I would add a couple more that are included in official course-ware (v11) and show in exam prep questions:

Cloud Attacks: Cloud Hopper Attack
Cloud Hopper attacks are triggered at the managed service providers (MSPs) and their users
Attackers initiate spear-phishing emails with custom-made malware to compromise the accounts of staff or cloud service firms to obtain confidential information

Cloud Attacks: Cloudborne Attack
Cloudborne is a vulnerability residing in a bare-metal cloud server that enables the attackers to implant a malicious backdoor in its firmware. The malicious backdoor can allow the attackers to bypass the security mechanisms and perform various activities such as watching new user’s activity or behavior, disabling the application or server, and intercepting or stealing the data.
Vulnerabilities in the bare-metal cloud server and inappropriate firmware re-flashing can pave the way for attackers to install and maintain backdoor persistence.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.