Site icon TheCyberThrone

CEH v13 Detailed Notes Part I

Advertisements

1. Definition of Ethical Hacking

2. History and Evolution of Hacking

3. Types of Hackers

  1. White Hat Hackers (Ethical Hackers)
    • Authorized professionals (pen testers, red teamers).
    • Help organizations strengthen defenses.
  2. Black Hat Hackers
    • Criminal hackers, unauthorized access, identity theft, ransomware, data breaches.
  3. Gray Hat Hackers
    • Operate between ethical and unethical boundaries.
    • May discover vulnerabilities without permission but disclose them responsibly.
  4. Other Subtypes:
    • Script Kiddies: Use ready-made tools/scripts without deep technical skill.
    • Hacktivists: Attack for political or social causes.
    • Nation-State Actors: Government-backed, highly resourced, focused on espionage and critical infrastructure.
    • Insiders: Disgruntled employees or contractors misusing privileges.

4. Five Phases of Ethical Hacking

(This is the core methodology tested heavily in CEH)

  1. Reconnaissance (Footprinting)
    • Collect information (DNS records, Whois, OSINT, social media, search engines).
    • Can be active (scanning) or passive (research only).
  2. Scanning and Enumeration
    • Identify live hosts, open ports, services, and system details.
    • Tools: Nmap, Nessus, Angry IP Scanner.
  3. Gaining Access
    • Exploit vulnerabilities to penetrate systems (password cracking, SQL injection, buffer overflows).
    • Objective: escalate privileges, exfiltrate data.
  4. Maintaining Access
    • Establish persistence using backdoors, Trojans, rootkits.
    • Goal: return later without detection.
  5. Covering Tracks
    • Clear logs, hide malware, erase tool footprints.
    • Prevent detection and forensic analysis.

5. Core Security Principles (CIA Triad + More)

Additional Security Principles:

6. Security Terminology

7. Common Attack Vectors in Modern Hacking

8. Security Controls

Security is enforced using three major control types:

  1. Administrative Controls
    • Policies, security awareness training, background checks.
  2. Technical Controls
    • Firewalls, IDS/IPS, antivirus, DLP, encryption.
  3. Physical Controls
    • CCTV, locks, biometric access, guards.

By function:

9. Laws, Standards, and Ethics in Ethical Hacking

10. Key Terms and Concepts for CEH Exam

Key Tips

Summary

Module 1 sets the foundation for CEH. It introduces ethical hacking, hacker types, core principles of information security, legal aspects, and the five-phase methodology. Most exam questions here are definition-based but some require you to identify scenarios (e.g., “John accesses a system without permission but later discloses the vulnerability responsibly. What type of hacker is he?” → Gray Hat).

1. Introduction to Footprinting

Two Major Categories:

  1. Passive Footprinting – Information gathered indirectly without touching target systems (e.g., Google search, job postings, social media).
  2. Active Footprinting – Direct interaction with the target (e.g., DNS queries, traceroute, network scanning).

2. Objectives of Footprinting

3. Footprinting Methodologies

Ethical hackers follow structured steps:

  1. Collect Target Information
    • Identify domain, subdomains, IP ranges, WHOIS info.
  2. Network Information Gathering
    • Find active IP blocks, ISPs, and network topology.
  3. System Information
    • OS types, services, and applications in use.
  4. Organizational Information
    • Employee details, business partners, vendors, cloud providers.
  5. Create a Target Profile
    • Combine collected data into a clear profile → foundation for scanning and exploitation.

4. Techniques of Footprinting

(A) Search Engines (Google Hacking / Dorking)

(B) WHOIS Lookup

(C) DNS Footprinting

(D) Network Footprinting

(E) Website Footprinting

(F) Email and Employee Information Gathering

(G) Job Sites, Forums, and Press Releases

(H) Dark Web Reconnaissance

5. Advanced Reconnaissance

6. Tools Used in Footprinting

7. Countermeasures Against Footprinting

Organizations can limit exposure by:

8. Important Terms

9. Sample Attack Scenario

  1. Hacker does a WHOIS lookup → gets DNS server details.
  2. Runs dig axfr → retrieves complete DNS records.
  3. Collects employee emails via theHarvester.
  4. Finds LinkedIn profiles → maps IT team members.
  5. Crafts spear-phishing emails → gains credentials → next step: scanning and exploitation.

Key Tips

Summary

Footprinting and reconnaissance are about information gathering before exploitation. Attackers use search engines, DNS, WHOIS, network analysis, email harvesting, and OSINT to build a profile of the target. Defenders must minimize their digital footprint, enforce security policies, and monitor external exposure.

Module 3: Scanning Networks

1. Introduction to Scanning

Footprinting = “What exists?”
Scanning = “Where and how can I enter?”


2. Goals of Network Scanning

  1. Discover live hosts in the target network.
  2. Identify open ports and their service states.
  3. Detect running services/applications on those ports.
  4. Perform OS fingerprinting (determine OS type/version).
  5. Detect firewalls, IDS/IPS, filtering mechanisms.
  6. Map the network structure to plan further exploitation.

3. Types of Scanning

(A) Network Scanning

(B) Port Scanning

(C) Service/Version Detection

(D) OS Fingerprinting

(E) Vulnerability Scanning

4. Scanning Methodology

Standard Ethical Hacking Scanning Workflow

  1. Check for live hosts (ping sweep, ARP scan).
  2. Identify open ports (TCP/UDP scans).
  3. Perform service detection (banner grabbing).
  4. Do OS fingerprinting.
  5. Scan for vulnerabilities.
  6. Draw network topology.

5. Port Scanning Techniques (Nmap Focus)

TCP Scans:

UDP Scan (-sU):

Stealth/Advanced Scans:

6. Banner Grabbing

7. Scanning Tools

8. Evasion Techniques (Anti-IDS/IPS Scanning)

Attackers try to avoid detection by:

9. Countermeasures (Defensive Actions)

Key Tips

Summary

Closing Insights

Module 1 gives big picture awareness of hacking.

Module 2 focuses on information collection (without touching the target much).

Module 3 goes deeper into active probing (interacting with the target network).

Together, they form the first 3 stages of an attack lifecycle:

  1. Understand & define the battlefield (Module 1).
  2. Collect intelligence (Module 2).
  3. Probe for weaknesses (Module 3).

Memory Hack (Exam Quick Recall):

M1 → Who & Why (Hacker types, CIA triad).

M2 → What can I find out silently (Recon).

M3 → What can I touch actively (Scanning

Exit mobile version