CEH Practical Guide
  • Certified Ethical Hacker (CEH v12 and CEH V13) Practical Guide: Complete Study Resources & Tips
  • Module 2. Footprinting and Reconnaissance
    • 1. Footprinting through Search Engines
    • 2. Perform Footprinting Through Internet Research Services
    • 3. Footprinting through Social Networking sites
    • 4. Website Footprinting
    • 5. WHOIS Footprinting
    • 6. DNS Footprinting
    • 7. Network footprinting
    • 8. Email Footprinting
    • 9. Footprinting using footprinting tools
    • 10. Perform Footprinting using AI
  • Module 3. Scanning Networks
    • 1. Host Discovery
    • 2. Port and Service Discovery
    • 3. Perform OS Discovery
    • 4. Scan beyond Firewalls and IDS
    • 5. Network scanning using various tools
    • 6. Perform Network Scanning using AI
  • Module 4. Enumeration
    • 1. Netbios Enumeration (Port 137)
    • 2. SNMP Enumeration (Port 161,162)
    • 3. LDAP Enumeration (Port 389)
    • 4. NFS Enumeration
    • 5. DNS Enumeration
    • 6. SMTP Enumeration
    • 7. RPC, SMB and FTP Enumeration
    • 8. Enumeration using various tools
    • 9. Perform Enumeration using AI
  • Module 5. Vulnerability Assessment
    • 1. Perform Vulnerability Research with Vulnerability Scoring Systems and Databases
    • 2. Perform Vulnerability Assessment using Various Vulnerability Assessment Tools
    • 3. Perform Vulnerability Analysis using AI
  • Module 6. System Hacking
    • 1. Gain access to the system
    • 2. Privilege Escalation
    • 3. Maintain Remote Access and Hide Malicious Activities
    • 4. Clear Logs to hide the Evidence of Compromise
    • 5. Active Directory (AD) Attacks
  • Module 7. Malware Threats
    • 1. Gain access to systems with Trojans
    • 2. Infect the system using Virus
    • 3. Perform Static Malware Analysis
    • 4. Perform Dynamic Malware Analysis
  • Module 8. Sniffing
    • 1. Perform Active Sniffing
    • 2. Perform Network Sniffing using Various Sniffing Tools
    • 3. Detect Network Sniffing
  • Module 9. Social Engineering
    • 1. Perform Social Engineering using tools
    • 2. Detect a Phishing attack
    • 3. Audit Organization security for phishing attacks
    • 4. Social Engineering using AI
  • Module 10. Denial of Service
    • 1. Perform DOS and DDOS with various techniques
    • 2. Detect and Protect DOS and DDOS attacks
  • Module 11. Session Hijacking
    • 1. Perform Session Hijacking
    • 2. Detect Session Hijacking
  • Module 12. Evading IDS, antivirus and Honeypots
    • 1. Intrusion Detection using various tools
    • 2. Evade Firewall using Evasion Techniques
  • Module 13. Hacking Web Servers
    • 1. Footprint the Webserver
    • 2. Perform Webserver attacks
    • 3. Perform a Web Server Hacking using AI
  • Module 14. Hacking Web Applications
    • 1. Footprint the Web Infrastructure
    • 2. Perform Web applications Attacks
    • 3. Detect Web Vulnerabilities using using web application security tools
    • 4. Perform Web Application Hacking using AI
  • Module 15. SQL Injection
    • 1. Perform SQL Injection attacks
    • 2. Detect SQL Vulnerabilities using different tool
    • 3. Perform SQL Injection using AI
  • Module 16. Hacking Wireless Networks
    • 1. Footprint a wireless Network
    • 2. Perform Wireless Traffic Analysis
    • 3. Perform Wireless Attacks
  • Module 17. Hacking Mobile Platforms
    • 1. Hack Android Devices
    • 2. Secure Android Device
  • Module 18. IoT and OT Hacking
    • 1. Footprinting IoT and OT devices
    • 2. Capture and Analyze IoT traffic
    • 3. Perform IoT Attacks
  • Module 19. Cloud Computing
    • 1. Perform Reconnaissance on Azure
    • 2. S3 Bucket Enumeration
    • 3. Exploit S3 buckets
    • 4. Perform Privilege Escalation to Gain Higher Privileges
    • 5. Perform Vulnerability Assessment on Docker Images
  • Module 20. Cryptography
    • 1. Encrypt the Information using Various Cryptography Tools
    • 2. Create a self signed Certificate
    • 3. Perform Disk Encryption
    • 4. Cryptanalysis Using different tools
    • 5. Perform Cryptography using AI
  • Tips for exams
  • Additional Resources
Powered by GitBook
On this page
  • Recommended Courses to get started in practical pentesting and hacking
  • Best WIFI card for Wifi Hacking
  • Why We Need a USB WiFi Adapter For Kali Linux?
  • Best WIFI Adapters for WIFI hacking
  • Best Hacking Books

Was this helpful?

Additional Resources

PreviousTips for exams

Last updated 2 months ago

Was this helpful?

Dont, stop learning, Do the CEH Practical course and get certified as a Certified Ethical Hacker (Practical)

____________________

Recommended Courses to get started in practical pentesting and hacking

______________________________________________

Best WIFI card for Wifi Hacking

Hacking Wireless Networks require wireless cards that support the monitor mode and packet Injection. Here is a list of Best WiFi Adapters for Kali Linux that are 100% compatible with the latest Kali Linux, that can go into monitor mode, inject packets and perform everything that is needed for a full-fledged WiFi Penetration Testing. Alpha adapters are best for WIFI pen testing in their price range and are compatible with Kali Linux.

Why We Need a USB WiFi Adapter For Kali Linux?

Every Laptop has a WIFI card in build. But why do we need an external WIFI adapter then? There are two issues with that, though.

· The first issue is that we cannot access built-in wireless adapters via Kali if installed as a virtual machine.

· The second and most serious issue is that these built-in wireless adapters are not suitable for hacking.

Even if we install Kali Linux as our primary machine, then we will get access to our built-in wireless card, but we will not be able to use it for hacking because it does not support monitor mode or packet injection. So if we need to use it for WiFi auditing and other interesting Kali Linux stuff like aircrack-ng and other tools, we will need to acquire a Kali Linux USB WiFi adapter.

Now while shopping for the best wireless adapter, you must be looking for the range of the wireless adapter and the frequency band it supports. Either it supports the 5 GHz band or not.

Best WIFI Adapters for WIFI hacking

Best Hacking Books

- New USB C type - $60

- Long Range dual band - $70

- Economical Does the Job- $20

- Best in its Price Range -$25

- Supports both 2.4 GHz and 5 GHz, bands - $58

CEH Practical Complete Preparation Course
1. Practical Hacking and Pentesting Course for Beginners
2. Complete Windows password hacking course
3. Cracking office files passwords(excel,PowerPoint,word)
4. CEHV12 Practical certification preparation course with hands on labs
5. IoT Hands-on Hacking and Pentesting course for beginners
6. Practical Malware Analysis for Beginners
AWUS036ACH
Alfa AWUS036ACM
BrosTrend 650Mbps
ALFA Network AWUS036ACS
Alfa AC1200
Hacking: The Art of Exploitation, 2nd Edition
OSINT Techniques: Resources for Uncovering Online Information
Hacking APIs: Breaking Web Application Programming Interfaces
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws