{"version":1,"pages":[{"id":"j7fYaWq3knCQVDO0njWa","title":"Certified Ethical Hacker CEH V13 Practical Guide: Complete Study Resources & Tips","pathname":"/","siteSpaceId":"sitesp_YCHus","description":"Discover comprehensive resources and expert tips to pass the Certified Ethical Hacker (CEH) Practical exam. Learn tools, techniques, and step-by-step instructions to ace the CEH Practical exam."},{"id":"IOjdAFRL3TRJKLV03VO6","title":"Module 2. Footprinting and Reconnaissance","pathname":"/module-2.-footprinting-and-reconnaissance","siteSpaceId":"sitesp_YCHus","description":""},{"id":"55RlZf9YCsJhIVn6p3wR","title":"1. Footprinting through  Search Engines","pathname":"/module-2.-footprinting-and-reconnaissance/1.-footprinting-through-search-engines","siteSpaceId":"sitesp_YCHus","description":"Through the effective use of search engines, you can extract critical information about a target organization such as technology platforms, employee details, login pages, intranet portals etc","breadcrumbs":[{"label":"Module 2. Footprinting and Reconnaissance"}]},{"id":"RoN6Vx9Y5wcwuvPwszL9","title":"2. Perform Footprinting Through Internet Research Services","pathname":"/module-2.-footprinting-and-reconnaissance/2.-perform-footprinting-through-internet-research-services","siteSpaceId":"sitesp_YCHus","description":"As a professional ethical hacker or pen tester, you should be able to extract a variety of information about your target organization from Internet research services.","breadcrumbs":[{"label":"Module 2. Footprinting and Reconnaissance"}]},{"id":"vcvCRppE3csIFJzKgrqc","title":"3. Footprinting through Social Networking sites","pathname":"/module-2.-footprinting-and-reconnaissance/3.-footprinting-through-social-networking-sites","siteSpaceId":"sitesp_YCHus","description":"By footprinting through social networking sites, you can extract personal information such as name, position, organization name, current location, and educational qualifications.","breadcrumbs":[{"label":"Module 2. Footprinting and Reconnaissance"}]},{"id":"H2VkwOMHDSnTjEA3CnAk","title":"4. Website Footprinting","pathname":"/module-2.-footprinting-and-reconnaissance/4.-website-footprinting","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 2. Footprinting and Reconnaissance"}]},{"id":"anzbofO83Qc4cJDjiwmJ","title":"5. WHOIS Footprinting","pathname":"/module-2.-footprinting-and-reconnaissance/5.-whois-footprinting","siteSpaceId":"sitesp_YCHus","description":"whois protocol runs on port 43.Regional internet Registries keep records of all data","breadcrumbs":[{"label":"Module 2. Footprinting and Reconnaissance"}]},{"id":"0DhgqmQdBIFMZSW2eDBC","title":"6. DNS Footprinting","pathname":"/module-2.-footprinting-and-reconnaissance/6.-dns-footprinting","siteSpaceId":"sitesp_YCHus","description":"You need to perform DNS footprinting to gather information about DNS servers, DNS records, and types of servers used by the target organization. DNS zone data etc","breadcrumbs":[{"label":"Module 2. Footprinting and Reconnaissance"}]},{"id":"XbHDh8x1nmBhnJIyJ65S","title":"7. Network footprinting","pathname":"/module-2.-footprinting-and-reconnaissance/7.-network-footprinting","siteSpaceId":"sitesp_YCHus","description":"Network footprinting is carried out to gather the network-related information of a target organization such as network range, traceroute, TTL values, etc","breadcrumbs":[{"label":"Module 2. Footprinting and Reconnaissance"}]},{"id":"6XfAOgvHtfpQEKouJfub","title":"8. Email Footprinting","pathname":"/module-2.-footprinting-and-reconnaissance/8.-email-footprinting","siteSpaceId":"sitesp_YCHus","description":"Email tracking allows you to collect information such as IP addresses, mail servers, OS details, geolocation, information about service providers involved in sending the mail etc","breadcrumbs":[{"label":"Module 2. Footprinting and Reconnaissance"}]},{"id":"Sk6mJvJfhbLYbA4fg1PZ","title":"9. Footprinting using footprinting tools","pathname":"/module-2.-footprinting-and-reconnaissance/9.-footprinting-using-footprinting-tools","siteSpaceId":"sitesp_YCHus","description":"Footprinting tools are used to collect basic information about the target systems in order to exploit them.","breadcrumbs":[{"label":"Module 2. Footprinting and Reconnaissance"}]},{"id":"XFuCocWW0ykO4GD1ibny","title":"10. Perform Footprinting using AI","pathname":"/module-2.-footprinting-and-reconnaissance/10.-perform-footprinting-using-ai","siteSpaceId":"sitesp_YCHus","description":"Footprinting using AI accelerates the reconnaissance process by automating data collection and analysis, allowing security professionals to uncover vulnerabilities more efficiently.","breadcrumbs":[{"label":"Module 2. Footprinting and Reconnaissance"}]},{"id":"94SXZ1f2fAaWK4MkF1VP","title":"Module 3. Scanning Networks","pathname":"/module-3.-scanning-networks","siteSpaceId":"sitesp_YCHus","description":""},{"id":"hQdz0JnQgl78aWX3J6QE","title":"1. Host Discovery","pathname":"/module-3.-scanning-networks/1.-host-discovery","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 3. Scanning Networks"}]},{"id":"wpS9ooPwsp3dw0L0xUU8","title":"2. Port and Service Discovery","pathname":"/module-3.-scanning-networks/2.-port-and-service-discovery","siteSpaceId":"sitesp_YCHus","description":"The next step after discovering active hosts in the target network is to scan for open ports and services running on the target IP addresses","breadcrumbs":[{"label":"Module 3. Scanning Networks"}]},{"id":"fYuh1ZZRNpR43w7in19X","title":"3. Perform OS Discovery","pathname":"/module-3.-scanning-networks/3.-perform-os-discovery","siteSpaceId":"sitesp_YCHus","description":"Identifying the OS used on the target system allows you to assess the system’s vulnerabilities and the exploits that might work on the system to perform additional attacks.","breadcrumbs":[{"label":"Module 3. Scanning Networks"}]},{"id":"cuEU4asYr5JqcRQavCVR","title":"4. Scan beyond Firewalls and IDS","pathname":"/module-3.-scanning-networks/4.-scan-beyond-firewalls-and-ids","siteSpaceId":"sitesp_YCHus","description":"IDSs and firewalls are efficient security mechanisms; however, they still have some security limitations. You may be required to launch attacks to exploit these limitations using various IDS/firewall","breadcrumbs":[{"label":"Module 3. Scanning Networks"}]},{"id":"HD6fxhnHA0eCm3cKAbxz","title":"5.  Network scanning using various tools","pathname":"/module-3.-scanning-networks/5.-network-scanning-using-various-tools","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 3. Scanning Networks"}]},{"id":"Ww2ujdsS9YiZvEAxOCyt","title":"6. Perform Network Scanning using AI","pathname":"/module-3.-scanning-networks/6.-perform-network-scanning-using-ai","siteSpaceId":"sitesp_YCHus","description":"Network scanning using AI enhances cybersecurity by automating the detection of vulnerabilities and threats.","breadcrumbs":[{"label":"Module 3. Scanning Networks"}]},{"id":"ekxJHNquCotYwLvVB7sM","title":"Module 4. Enumeration","pathname":"/module-4.-enumeration","siteSpaceId":"sitesp_YCHus","description":"Enumeration is the process of extracting usernames, machine names, network resources, shares, and services from a system or network."},{"id":"3re98Zr3bS1JQpuIm4Vv","title":"1. Netbios Enumeration (Port 137)","pathname":"/module-4.-enumeration/1.-netbios-enumeration-port-137","siteSpaceId":"sitesp_YCHus","description":"used for file and printer sharing. port 137. Netbios name 16 characters. 15 chars define name and 16th character type of service. Port 137 is utilized by the NetBIOS Name service.","breadcrumbs":[{"label":"Module 4. Enumeration"}]},{"id":"4GvYQWp5W2HoJL44xOtc","title":"2. SNMP Enumeration (Port 161,162)","pathname":"/module-4.-enumeration/2.-snmp-enumeration-port-161-162","siteSpaceId":"sitesp_YCHus","description":"Use SNMP (application layer protocol) to obtain a list of user accounts and devices on system","breadcrumbs":[{"label":"Module 4. Enumeration"}]},{"id":"qZFKpNZJeYocFTrJHxxm","title":"3. LDAP Enumeration (Port 389)","pathname":"/module-4.-enumeration/3.-ldap-enumeration-port-389","siteSpaceId":"sitesp_YCHus","description":"Gather information about usernames, addresses,departmental details, servers etc","breadcrumbs":[{"label":"Module 4. Enumeration"}]},{"id":"ZiVEjM8sZOxYaz1JOCKj","title":"4. NFS Enumeration","pathname":"/module-4.-enumeration/4.-nfs-enumeration","siteSpaceId":"sitesp_YCHus","description":"port 111 ans 2049(tcp)","breadcrumbs":[{"label":"Module 4. Enumeration"}]},{"id":"RMJzJpyKrnzKEC7vOTqb","title":"5. DNS Enumeration","pathname":"/module-4.-enumeration/5.-dns-enumeration","siteSpaceId":"sitesp_YCHus","description":"DNS enumeration techniques are used to obtain information about the DNS servers and network infrastructure of the target organization.","breadcrumbs":[{"label":"Module 4. Enumeration"}]},{"id":"yJEIVHh4LE5oqlBT1ki6","title":"6. SMTP Enumeration","pathname":"/module-4.-enumeration/6.-smtp-enumeration","siteSpaceId":"sitesp_YCHus","description":"SMTP enumeration is performed to obtain a list of valid users, delivery addresses, message recipients on an SMTP server. Ports 25,2525 or 587.","breadcrumbs":[{"label":"Module 4. Enumeration"}]},{"id":"LmMK26dFE7NBrLBjOtwX","title":"7. RPC, SMB and FTP Enumeration","pathname":"/module-4.-enumeration/7.-rpc-smb-and-ftp-enumeration","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 4. Enumeration"}]},{"id":"KbPtSUi2EjBR5LPZM2wF","title":"8. Enumeration using various tools","pathname":"/module-4.-enumeration/8.-enumeration-using-various-tools","siteSpaceId":"sitesp_YCHus","description":"As an ethical hacker, you should use a range of tools to find as much information as possible about the target network’s systems.","breadcrumbs":[{"label":"Module 4. Enumeration"}]},{"id":"X5VAnfs8384DNVrCUGWj","title":"9. Perform Enumeration using AI","pathname":"/module-4.-enumeration/9.-perform-enumeration-using-ai","siteSpaceId":"sitesp_YCHus","description":"Artificial Intelligence (AI) can significantly enhance the enumeration process by automating tasks, analyzing large datasets, and identifying patterns that might be missed by traditional tools.","breadcrumbs":[{"label":"Module 4. Enumeration"}]},{"id":"nYDj0Ia0a1TQSL2uuKtK","title":"Module 5. Vulnerability Assessment","pathname":"/module-5.-vulnerability-assessment","siteSpaceId":"sitesp_YCHus","description":""},{"id":"SRiD1glGP4urJtYlE7Xb","title":"1. Perform Vulnerability Research with Vulnerability Scoring Systems and Databases","pathname":"/module-5.-vulnerability-assessment/1.-perform-vulnerability-research-with-vulnerability-scoring-systems-and-databases","siteSpaceId":"sitesp_YCHus","description":"Vulnerability research provides awareness of advanced techniques to identify flaws or loopholes in the software that could be exploited.","breadcrumbs":[{"label":"Module 5. Vulnerability Assessment"}]},{"id":"pxCIW5u7k6eVtAJQOgWx","title":"2. Perform Vulnerability Assessment using Various Vulnerability Assessment Tools","pathname":"/module-5.-vulnerability-assessment/2.-perform-vulnerability-assessment-using-various-vulnerability-assessment-tools","siteSpaceId":"sitesp_YCHus","description":"A vulnerability assessment is an in-depth examination of the ability of a system or application, including current security procedures and controls, to withstand exploitation.","breadcrumbs":[{"label":"Module 5. Vulnerability Assessment"}]},{"id":"DxPl3YoHSzUKjGJG4F7G","title":"3. Perform Vulnerability Analysis using AI","pathname":"/module-5.-vulnerability-assessment/3.-perform-vulnerability-analysis-using-ai","siteSpaceId":"sitesp_YCHus","description":"Vulnerability Analysis with AI employs advanced algorithms to unearth hidden security flaws in networks. AI-driven tools extract comprehensive data, prioritize risks, and fortify defenses.","breadcrumbs":[{"label":"Module 5. Vulnerability Assessment"}]},{"id":"fAeT8acpRmXYfoZyvNt4","title":"Module 6. System Hacking","pathname":"/module-6.-system-hacking","siteSpaceId":"sitesp_YCHus","description":""},{"id":"4oIhMmJDKxyGTWBF9SIt","title":"1. Gain access to the system","pathname":"/module-6.-system-hacking/1.-gain-access-to-the-system","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 6. System Hacking"}]},{"id":"vGBwRZPs2RPTdHEI1iPv","title":"2. Privilege Escalation","pathname":"/module-6.-system-hacking/2.-privilege-escalation","siteSpaceId":"sitesp_YCHus","description":"Privilege Escalation techniques to learn for CEH Practical","breadcrumbs":[{"label":"Module 6. System Hacking"}]},{"id":"cxdv4l2K58jyWZCX99qV","title":"3. Maintain Remote Access and Hide Malicious Activities","pathname":"/module-6.-system-hacking/3.-maintain-remote-access-and-hide-malicious-activities","siteSpaceId":"sitesp_YCHus","description":"Remote code execution techniques are often performed after initially compromising a system and further expanding access to remote systems present on the target network.","breadcrumbs":[{"label":"Module 6. System Hacking"}]},{"id":"G42bXE5JWOfffJbvCT0y","title":"4. Clear Logs to hide the Evidence of Compromise","pathname":"/module-6.-system-hacking/4.-clear-logs-to-hide-the-evidence-of-compromise","siteSpaceId":"sitesp_YCHus","description":"To remain undetected, the intruders need to erase all evidence of security compromise from the system.","breadcrumbs":[{"label":"Module 6. System Hacking"}]},{"id":"sHSVyLKjWVXJuu0IYDeL","title":"5. Active Directory (AD) Attacks","pathname":"/module-6.-system-hacking/5.-active-directory-ad-attacks","siteSpaceId":"sitesp_YCHus","description":"The module has recently been added in CEH V13 Practical","breadcrumbs":[{"label":"Module 6. System Hacking"}]},{"id":"t0afNJKRI0lGoSubQg1F","title":"Module 7. Malware Threats","pathname":"/module-7.-malware-threats","siteSpaceId":"sitesp_YCHus","description":"Malware is malicious software that damages or disables computer systems and gives limited or full control of those systems to the malware creator for theft or fraud."},{"id":"U065UYlkVOHxPxLauH31","title":"1. Gain access to systems with Trojans","pathname":"/module-7.-malware-threats/1.-gain-access-to-systems-with-trojans","siteSpaceId":"sitesp_YCHus","description":"The lab tasks in this exercise demonstrate how easily hackers can gain access to the target systems in the organization and create a covert communication channel for transferring sensitive data.","breadcrumbs":[{"label":"Module 7. Malware Threats"}]},{"id":"LMBvSeZWR4qjZfDXU3T2","title":"2. Infect the system using Virus","pathname":"/module-7.-malware-threats/2.-infect-the-system-using-virus","siteSpaceId":"sitesp_YCHus","description":"Viruses are the scourges of modern computing. Computer viruses have the potential to wreak havoc on both business and personal computers.","breadcrumbs":[{"label":"Module 7. Malware Threats"}]},{"id":"h1JlCUU8vK41pO7xTC5m","title":"3. Perform Static Malware Analysis","pathname":"/module-7.-malware-threats/3.-perform-static-malware-analysis","siteSpaceId":"sitesp_YCHus","description":"Static Malware Analysis, also known as code analysis, involves going through the executable binary code without executing it to gain a better understanding of the malware and its purpose.","breadcrumbs":[{"label":"Module 7. Malware Threats"}]},{"id":"xIwuTFHZcXkj7sGveN7N","title":"4. Perform Dynamic Malware Analysis","pathname":"/module-7.-malware-threats/4.-perform-dynamic-malware-analysis","siteSpaceId":"sitesp_YCHus","description":"Dynamic Malware Analysis, also known as behavioral analysis, involves executing malware code to learn how it interacts with the host system and its impact after infecting the system.","breadcrumbs":[{"label":"Module 7. Malware Threats"}]},{"id":"DW1qimwjj8cZv5Kv3bKl","title":"Module 8. Sniffing","pathname":"/module-8.-sniffing","siteSpaceId":"sitesp_YCHus","description":"Packet sniffing is a process of monitoring and capturing all data packets passing through a given network using a software application or hardware device."},{"id":"ummYGm95W1820a5QDFIM","title":"1. Perform Active Sniffing","pathname":"/module-8.-sniffing/1.-perform-active-sniffing","siteSpaceId":"sitesp_YCHus","description":"In active sniffing, ARP traffic is actively injected into a LAN to sniff around a switched network and capture its traffic.","breadcrumbs":[{"label":"Module 8. Sniffing"}]},{"id":"sLXrjhMKEQ22mNAALyDD","title":"2. Perform Network Sniffing using Various Sniffing Tools","pathname":"/module-8.-sniffing/2.-perform-network-sniffing-using-various-sniffing-tools","siteSpaceId":"sitesp_YCHus","description":"An attacker can use sniffing tools such as Wireshark to sniff the traffic flowing between the client and the server.","breadcrumbs":[{"label":"Module 8. Sniffing"}]},{"id":"09PEvPMRimcRvNT9VNMs","title":"3. Detect Network Sniffing","pathname":"/module-8.-sniffing/3.-detect-network-sniffing","siteSpaceId":"sitesp_YCHus","description":"A professional ethical hacker or pen tester should be able to detect network sniffing in the network.","breadcrumbs":[{"label":"Module 8. Sniffing"}]},{"id":"0zovMu9hoeVsrOAZvTRL","title":"Module 9. Social Engineering","pathname":"/module-9.-social-engineering","siteSpaceId":"sitesp_YCHus","description":""},{"id":"Lm9wBOTbHgrQN8HnaA3Z","title":"1. Perform Social Engineering using tools","pathname":"/module-9.-social-engineering/1.-perform-social-engineering-using-tools","siteSpaceId":"sitesp_YCHus","description":"In a social engineering test, you should try to trick the user into disclosing personal information such as credit card numbers, bank account details etx","breadcrumbs":[{"label":"Module 9. Social Engineering"}]},{"id":"W6qzYiHC3bVqjef9AKmB","title":"2. Detect a Phishing attack","pathname":"/module-9.-social-engineering/2.-detect-a-phishing-attack","siteSpaceId":"sitesp_YCHus","description":"In this lab, you will learn how to detect phishing attempts using various phishing detection tools.","breadcrumbs":[{"label":"Module 9. Social Engineering"}]},{"id":"gmXISwheCGAHhRfZJJDO","title":"3. Audit Organization security for phishing attacks","pathname":"/module-9.-social-engineering/3.-audit-organization-security-for-phishing-attacks","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 9. Social Engineering"}]},{"id":"5m2X0jI1LMDxzoXndMqI","title":"4. Social Engineering using AI","pathname":"/module-9.-social-engineering/4.-social-engineering-using-ai","siteSpaceId":"sitesp_YCHus","description":"he AI automates the creation of realistic phishing emails, convincing pretext scenarios, and strategic baiting tactics.","breadcrumbs":[{"label":"Module 9. Social Engineering"}]},{"id":"lAPWv4gbOT12JuVP7Vi0","title":"Module 10. Denial of Service","pathname":"/module-10.-denial-of-service","siteSpaceId":"sitesp_YCHus","description":"DoS and DDoS attacks exploit vulnerabilities in the implementation of TCP/IP model protocol or bugs in a specific OS."},{"id":"mJjHkds9ATjES4KgjbXF","title":"1. Perform DOS and DDOS with various techniques","pathname":"/module-10.-denial-of-service/1.-perform-dos-and-ddos-with-various-techniques","siteSpaceId":"sitesp_YCHus","description":"As an expert ethical hacker or pen tester, you must have the required knowledge to perform DoS and DDoS attacks to be able to test systems in the target network.","breadcrumbs":[{"label":"Module 10. Denial of Service"}]},{"id":"tDJOXOhe6rb80CW4wsvA","title":"2. Detect and Protect DOS and DDOS attacks","pathname":"/module-10.-denial-of-service/2.-detect-and-protect-dos-and-ddos-attacks","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 10. Denial of Service"}]},{"id":"byuzvbp5Ze48fj7mC479","title":"Module 11. Session Hijacking","pathname":"/module-11.-session-hijacking","siteSpaceId":"sitesp_YCHus","description":"A session hijacking attack refers to the exploitation of a session token-generation mechanism or token security controls that enables an attacker to establish an unauthorized connection with a target"},{"id":"0JejiLPBnbh91lmnb3O5","title":"1. Perform Session Hijacking","pathname":"/module-11.-session-hijacking/1.-perform-session-hijacking","siteSpaceId":"sitesp_YCHus","description":"Session hijacking allows an attacker to take over an active session by bypassing the authentication process.","breadcrumbs":[{"label":"Module 11. Session Hijacking"}]},{"id":"lDDorLXVUxcxgz1BYqUd","title":"2. Detect  Session Hijacking","pathname":"/module-11.-session-hijacking/2.-detect-session-hijacking","siteSpaceId":"sitesp_YCHus","description":"Fortunately, there are various tools available that can help you to detect session hijacking attacks such as packet sniffers, IDSs, and SIEMs.","breadcrumbs":[{"label":"Module 11. Session Hijacking"}]},{"id":"COEXp0u18kxXs43EuI0N","title":"Module 12. Evading IDS, antivirus and Honeypots","pathname":"/module-12.-evading-ids-antivirus-and-honeypots","siteSpaceId":"sitesp_YCHus","description":""},{"id":"jdTqA3SAJUmfBWB736Xz","title":"1. Intrusion Detection using various tools","pathname":"/module-12.-evading-ids-antivirus-and-honeypots/1.-intrusion-detection-using-various-tools","siteSpaceId":"sitesp_YCHus","description":"The goal of the Intrusion Detection Analyst is to find possible attacks against a network","breadcrumbs":[{"label":"Module 12. Evading IDS, antivirus and Honeypots"}]},{"id":"LaHfSiZ1FNAtpuQioPz9","title":"2. Evade Firewall using Evasion Techniques","pathname":"/module-12.-evading-ids-antivirus-and-honeypots/2.-evade-firewall-using-evasion-techniques","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 12. Evading IDS, antivirus and Honeypots"}]},{"id":"2nMsuos0g2Hx1E5l22qb","title":"Module 13. Hacking Web Servers","pathname":"/module-13.-hacking-web-servers","siteSpaceId":"sitesp_YCHus","description":""},{"id":"NqxaeqzA8jAbvqNjNYZr","title":"1. Footprint the Webserver","pathname":"/module-13.-hacking-web-servers/1.-footprint-the-webserver","siteSpaceId":"sitesp_YCHus","description":"An ethical hacker or penetration tester must perform footprinting to detect the loopholes in the web server of the target organization.","breadcrumbs":[{"label":"Module 13. Hacking Web Servers"}]},{"id":"GiGyki6PAFjeHE8x02hs","title":"2. Perform Webserver attacks","pathname":"/module-13.-hacking-web-servers/2.-perform-webserver-attacks","siteSpaceId":"sitesp_YCHus","description":"An ethical hacker or pen tester must test the company’s web server against various attacks and other vulnerabilities","breadcrumbs":[{"label":"Module 13. Hacking Web Servers"}]},{"id":"AoS54wDKcSxxB3JGZDbF","title":"3. Perform a Web Server Hacking using AI","pathname":"/module-13.-hacking-web-servers/3.-perform-a-web-server-hacking-using-ai","siteSpaceId":"sitesp_YCHus","description":"AI-powered tools and techniques provide ethical hackers with enhanced capabilities to discover vulnerabilities, automate attacks, and strengthen defenses.","breadcrumbs":[{"label":"Module 13. Hacking Web Servers"}]},{"id":"zPfkh1tYUNl7Tr2tKyFp","title":"Module 14. Hacking Web Applications","pathname":"/module-14.-hacking-web-applications","siteSpaceId":"sitesp_YCHus","description":""},{"id":"ETS9O4L3PwhCbFLLpJmM","title":"1. Footprint the Web Infrastructure","pathname":"/module-14.-hacking-web-applications/1.-footprint-the-web-infrastructure","siteSpaceId":"sitesp_YCHus","description":"Web infrastructure footprinting helps you to identify vulnerable web applications, understand how they connect with peers and the technologies they use, and find vulnerabilities.","breadcrumbs":[{"label":"Module 14. Hacking Web Applications"}]},{"id":"IhjNyVk3GsuQg5qU2Z4d","title":"2. Perform Web applications Attacks","pathname":"/module-14.-hacking-web-applications/2.-perform-web-applications-attacks","siteSpaceId":"sitesp_YCHus","description":"An ethical hacker or pen tester must test their company’s web application against various attacks and other vulnerabilities.","breadcrumbs":[{"label":"Module 14. Hacking Web Applications"}]},{"id":"a2VnPJLPf1cjI6p8xJmL","title":"3. Detect Web Vulnerabilities using using web application security tools","pathname":"/module-14.-hacking-web-applications/3.-detect-web-vulnerabilities-using-using-web-application-security-tools","siteSpaceId":"sitesp_YCHus","description":"The tasks in this lab will assist in discovering the underlying vulnerabilities and flaws in the target web application.","breadcrumbs":[{"label":"Module 14. Hacking Web Applications"}]},{"id":"in2XigsNxKxtmHf2RN1A","title":"4. Perform Web Application Hacking using AI","pathname":"/module-14.-hacking-web-applications/4.-perform-web-application-hacking-using-ai","siteSpaceId":"sitesp_YCHus","description":"Hacking web applications using AI involves leveraging advanced machine learning techniques to exploit vulnerabilities in web applications.","breadcrumbs":[{"label":"Module 14. Hacking Web Applications"}]},{"id":"qqhtYMkWtfWFreTzOpMo","title":"Module 15. SQL Injection","pathname":"/module-15.-sql-injection","siteSpaceId":"sitesp_YCHus","description":""},{"id":"HxC2TVTbzxsMN30rn3U7","title":"1. Perform SQL Injection attacks","pathname":"/module-15.-sql-injection/1.-perform-sql-injection-attacks","siteSpaceId":"sitesp_YCHus","description":"SQL injection attacks are performed on SQL databases with weak codes that do not adequately filter, use strong typing, or correctly execute user input.","breadcrumbs":[{"label":"Module 15. SQL Injection"}]},{"id":"VeiFGKisjAqBXd6aN2hb","title":"2.  Detect SQL Vulnerabilities using different tool","pathname":"/module-15.-sql-injection/2.-detect-sql-vulnerabilities-using-different-tool","siteSpaceId":"sitesp_YCHus","description":"In this lab, you will learn how to test for SQL injection vulnerabilities using various other SQL injection detection tools.","breadcrumbs":[{"label":"Module 15. SQL Injection"}]},{"id":"O0TNKLVrF8haspYiExmP","title":"3. Perform SQL Injection using AI","pathname":"/module-15.-sql-injection/3.-perform-sql-injection-using-ai","siteSpaceId":"sitesp_YCHus","description":"As an ethical hacker or penetration tester, you must have a sound knowledge on the integration of AI technology in identifying and exploiting SQL injection vulnerabilities","breadcrumbs":[{"label":"Module 15. SQL Injection"}]},{"id":"RBlz52UHjH4MUBTtFoP3","title":"Module 16. Hacking Wireless Networks","pathname":"/module-16.-hacking-wireless-networks","siteSpaceId":"sitesp_YCHus","description":""},{"id":"4kitIrnknrCSv1Vj0YHc","title":"1.  Footprint a wireless Network","pathname":"/module-16.-hacking-wireless-networks/1.-footprint-a-wireless-network","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 16. Hacking Wireless Networks"}]},{"id":"W4euLSVJmdoYij3DpIjO","title":"2. Perform Wireless Traffic Analysis","pathname":"/module-16.-hacking-wireless-networks/2.-perform-wireless-traffic-analysis","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 16. Hacking Wireless Networks"}]},{"id":"g5Vz6xhIVCOKyZvLreZ3","title":"3. Perform  Wireless Attacks","pathname":"/module-16.-hacking-wireless-networks/3.-perform-wireless-attacks","siteSpaceId":"sitesp_YCHus","description":"As an ethical hacker and pen tester of an organization, you must test its wireless security, exploit WPA2 flaws, and crack the network’s access point keys.","breadcrumbs":[{"label":"Module 16. Hacking Wireless Networks"}]},{"id":"eNTV65djSF9oj8ybYvsY","title":"Module 17. Hacking Mobile Platforms","pathname":"/module-17.-hacking-mobile-platforms","siteSpaceId":"sitesp_YCHus","description":""},{"id":"dsVr0rRUR3moQ0wfvFBx","title":"1. Hack Android Devices","pathname":"/module-17.-hacking-mobile-platforms/1.-hack-android-devices","siteSpaceId":"sitesp_YCHus","description":"As a professional ethical hacker or pen tester, you should be familiar with all the hacking tools, exploits, and payloads to perform various tests mobile devices connected to a network.","breadcrumbs":[{"label":"Module 17. Hacking Mobile Platforms"}]},{"id":"VQ89Dc9UjiQIHwCEp9jD","title":"2. Secure Android Device","pathname":"/module-17.-hacking-mobile-platforms/2.-secure-android-device","siteSpaceId":"sitesp_YCHus","description":"Like personal computers, mobile devices store sensitive data and are susceptible to various threats. Therefore, they should be properly secured.","breadcrumbs":[{"label":"Module 17. Hacking Mobile Platforms"}]},{"id":"oVYxopt077SMrzdgZS0k","title":"Module 18. IoT and OT Hacking","pathname":"/module-18.-iot-and-ot-hacking","siteSpaceId":"sitesp_YCHus","description":""},{"id":"X5ovSR04hShhQtV53zZJ","title":"1. Footprinting IoT and OT devices","pathname":"/module-18.-iot-and-ot-hacking/1.-footprinting-iot-and-ot-devices","siteSpaceId":"sitesp_YCHus","description":"As a professional ethical hacker or pen tester, your first step is to gather maximum information about the target IoT and OT devices by performing footprinting","breadcrumbs":[{"label":"Module 18. IoT and OT Hacking"}]},{"id":"uiNQj32vmJ18w4ETIocZ","title":"2. Capture and Analyze IoT traffic","pathname":"/module-18.-iot-and-ot-hacking/2.-capture-and-analyze-iot-traffic","siteSpaceId":"sitesp_YCHus","description":"Using various tools and techniques, you can capture the valuable data flowing between the IoT devices","breadcrumbs":[{"label":"Module 18. IoT and OT Hacking"}]},{"id":"fVDsZ0xFPe0iNEX0fSGa","title":"3. Perform IoT Attacks","pathname":"/module-18.-iot-and-ot-hacking/3.-perform-iot-attacks","siteSpaceId":"sitesp_YCHus","description":"Most IoT devices come with security issues such as the absence of a proper authentication mechanism or the use of default credentials or absence of a lock-out mechanism","breadcrumbs":[{"label":"Module 18. IoT and OT Hacking"}]},{"id":"4K5S8cTysQDFKau0Dq8e","title":"Module 19. Cloud Computing","pathname":"/module-19.-cloud-computing","siteSpaceId":"sitesp_YCHus","description":""},{"id":"kLRz1vGt9BopmEonjPxU","title":"1. Perform Reconnaissance on Azure","pathname":"/module-19.-cloud-computing/1.-perform-reconnaissance-on-azure","siteSpaceId":"sitesp_YCHus","description":"As an ethical hacker, you need to know how to utilize PowerShell command-based scripting tools for conducting reconnaissance and gathering information.","breadcrumbs":[{"label":"Module 19. Cloud Computing"}]},{"id":"h3nfmPMgkYKY9FoCC9C4","title":"2. S3 Bucket Enumeration","pathname":"/module-19.-cloud-computing/2.-s3-bucket-enumeration","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 19. Cloud Computing"}]},{"id":"LIJ2P0n5dJRAuul2Cmpq","title":"3. Exploit S3 buckets","pathname":"/module-19.-cloud-computing/3.-exploit-s3-buckets","siteSpaceId":"sitesp_YCHus","description":"Using various techniques, you can exploit misconfigurations in bucket implementation and breach the security mechanism to compromise data privacy","breadcrumbs":[{"label":"Module 19. Cloud Computing"}]},{"id":"xg3uWuMKoI43EqBsSMt2","title":"4. Perform Privilege Escalation to Gain Higher Privileges","pathname":"/module-19.-cloud-computing/4.-perform-privilege-escalation-to-gain-higher-privileges","siteSpaceId":"sitesp_YCHus","description":"In the cloud platform, owing to mistakes in the access allocation system such as coding errors and design flaws, a customer, a third party, or an employee can obtain higher access rights than those th","breadcrumbs":[{"label":"Module 19. Cloud Computing"}]},{"id":"5JjnpZlZ1wGRauSWAezQ","title":"5. Perform Vulnerability Assessment on Docker Images","pathname":"/module-19.-cloud-computing/5.-perform-vulnerability-assessment-on-docker-images","siteSpaceId":"sitesp_YCHus","description":"By leveraging tools like Trivy, you can analyze Docker images, identifying and exploiting vulnerabilities","breadcrumbs":[{"label":"Module 19. Cloud Computing"}]},{"id":"q11xVZD4Zg9J663aXRop","title":"Module 20. Cryptography","pathname":"/module-20.-cryptography","siteSpaceId":"sitesp_YCHus","description":""},{"id":"eMLxizMpOmuctEGa4IIU","title":"1. Encrypt the Information using Various Cryptography Tools","pathname":"/module-20.-cryptography/1.-encrypt-the-information-using-various-cryptography-tools","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 20. Cryptography"}]},{"id":"gMOnhvMh4wuE6C8aVSmM","title":"2. Create a self signed Certificate","pathname":"/module-20.-cryptography/2.-create-a-self-signed-certificate","siteSpaceId":"sitesp_YCHus","description":"In cryptography and computer security, a self-signed certificate is an identity certificate signed by the same entity whose identity it verifies.","breadcrumbs":[{"label":"Module 20. Cryptography"}]},{"id":"TEgMeD7VRfKAb4e8I4Pm","title":"3. Perform Disk Encryption","pathname":"/module-20.-cryptography/3.-perform-disk-encryption","siteSpaceId":"sitesp_YCHus","description":"Disk encryption is a technology that protects the confidentiality of the data stored on a disk by converting it into an unreadable code using disk encryption software or hardware.","breadcrumbs":[{"label":"Module 20. Cryptography"}]},{"id":"xPhbJJDxzm4316RcLzJm","title":"4. Cryptanalysis Using different tools","pathname":"/module-20.-cryptography/4.-cryptanalysis-using-different-tools","siteSpaceId":"sitesp_YCHus","description":"","breadcrumbs":[{"label":"Module 20. Cryptography"}]},{"id":"20zEnMPtaOrNcD1l4Wy0","title":"5. Perform Cryptography using AI","pathname":"/module-20.-cryptography/5.-perform-cryptography-using-ai","siteSpaceId":"sitesp_YCHus","description":"AI-enhanced cryptography empowers ethical hackers with advanced tools for securing data through complex algorithms and neural networks.","breadcrumbs":[{"label":"Module 20. Cryptography"}]},{"id":"qsPoGULQs5dX3iQA7cMq","title":"Tips and Tricks for CEH Practical exam","pathname":"/tips-and-tricks-for-ceh-practical-exam","siteSpaceId":"sitesp_YCHus","description":""},{"id":"irjSnSNV6gJDIy5Lotfd","title":"Additional Resources","pathname":"/additional-resources","siteSpaceId":"sitesp_YCHus"}]}