Site icon TheCyberThrone

CEH v13 Detailed Notes Part II

Advertisements

Introduction (Modules 4–6)

Modules 4–6 of CEH v13 take us from understanding how attackers enumerate systems (gathering detailed system-level data) all the way to actively hacking into those systems and maintaining stealthy access.

Module 4 – Enumeration:
This is the bridge between scanning and exploitation. Once attackers identify open services (from scanning), they enumerate deeper details—usernames, groups, shares, SNMP data, banners, DNS records, etc. Enumeration gives the “blueprint” of the target’s internal structure.

Module 5 – Vulnerability Analysis:
With gathered data, attackers (and defenders) must identify which weaknesses exist and how severe they are. This module focuses on vulnerability scanning tools, scoring systems like CVSS, and reporting. It shifts from raw data → prioritized risks.

Module 6 – System Hacking:
This is where an attacker moves from reconnaissance into hands-on exploitation. They gain access, escalate privileges, execute malicious tasks, hide activity, and ensure persistence. This represents the core of real-world attacks and is crucial for penetration testers and red teams to simulate, and defenders to block.

1. Introduction to Enumeration

2. Information Revealed During Enumeration

⚠️ Key Exam Tip: Enumeration is often the first step where attackers begin to leave logs and traces, because it requires active interaction.

3. Common Enumeration Protocols & Services

3.1 NetBIOS / SMB Enumeration

3.2 SNMP Enumeration

3.3 LDAP Enumeration

3.4 NFS Enumeration

3.5 SMTP Enumeration

3.6 DNS Enumeration

3.7 Other Services

4. Enumeration Techniques

5. Tools for Enumeration

6. Countermeasures

7. Real-world Example

8. Key Takeaways

9. Memory Hook

Module 5: Vulnerability Analysis

1. Understanding Vulnerability Analysis

2. Difference Between Vulnerability Analysis & Penetration Testing

💡 Exam Tip: CEH often asks: “Which phase identifies system weaknesses without exploiting them?” → Answer: Vulnerability Analysis.

3. Types of Vulnerabilities

  1. Host-based
    • Outdated OS patches.
    • Weak user accounts, default passwords.
    • Unnecessary services (FTP, Telnet).
  2. Network-based
    • Open/unused ports.
    • Poorly configured firewalls/routers.
    • Weak encryption protocols (e.g., SSL v2, WEP).
  3. Application-level
    • OWASP Top 10 flaws (SQL injection, XSS, insecure deserialization).
    • Poor session management.
    • Missing input validation.
  4. Database-level
    • Default DB credentials.
    • SQL injection vulnerabilities.
    • Lack of least privilege.
  5. Cloud-based
    • Misconfigured S3 buckets (public data exposure).
    • Weak IAM roles.
    • Overly permissive firewall security groups.
  6. Zero-day
    • Unknown vulnerabilities (no vendor patch yet).
    • High risk since attackers exploit before defenders know.

4. Vulnerability Analysis Process

Step 1: Planning & Scoping

Step 2: Information Gathering

Step 3: Vulnerability Detection

Step 4: Analysis & Verification

Step 5: Risk Classification

Step 6: Reporting

Step 7: Remediation & Revalidation

5. Vulnerability Scoring Systems

  1. CVSS (Common Vulnerability Scoring System)
    • Standard scoring framework (0–10 scale).
    • Categories:
      • Low (0–3.9)
      • Medium (4.0–6.9)
      • High (7.0–8.9)
      • Critical (9.0–10.0)
    • Factors considered:
      • Attack Vector (local/remote).
      • Attack Complexity (low/high).
      • Privileges required.
      • Impact on CIA triad.
  2. CVE (Common Vulnerabilities and Exposures)
    • Unique identifier for each known vulnerability (e.g., CVE-2017-0144 → EternalBlue).
  3. NVD (National Vulnerability Database)
    • Maintains CVE entries + CVSS scoring.
  4. OWASP Risk Rating
    • Web/app-focused scoring system.
    • Considers exploitability and business impact.

6. Vulnerability Analysis Tools

💡 Exam Tip: Nessus and OpenVAS are the most frequently mentioned vulnerability scanners.

7. Challenges in Vulnerability Analysis

8. Best Practices for Vulnerability Management

9. Real-World Example

10. Key Takeaways

Memory Hook:

Module 6: System Hacking

1. Overview

This is where attackers actually “own” the system.
Defenders must understand these methods to design prevention and detection strategies.

2. Step 1 – Gaining Access

Tools: Hydra, Medusa, John the Ripper, Hashcat, Cain & Abel.

3. Step 2 – Privilege Escalation

Techniques

Tools:

4. Step 3 – Executing Applications

Tools: Metasploit Framework, Empire, PsExec.

5. Step 4 – Hiding Files & Covering Tracks

Techniques

Tools: RootkitRevealer, GMER, chkrootkit, OpenStego.

6. Step 5 – Maintaining Access

Persistence Techniques

Tools: Netcat, Metasploit, Empire, Back Orifice, DarkComet RAT.

7. Password Cracking in Depth

Tools: Hashcat, Ophcrack (rainbow table tool), John the Ripper.

8. Keyloggers & Spyware

Defense:

9. Rootkits – Deep Dive

Detection Tools:

10. Steganography

11. Countermeasures (Defense Strategy)

  1. Password Security → enforce strong, unique, MFA.
  2. Patch Management → update OS and software regularly.
  3. Access Control → Principle of Least Privilege, role-based access.
  4. Security Monitoring → SIEM, centralized logs, anomaly detection.
  5. Endpoint Security → Antivirus + EDR solutions.
  6. User Awareness → phishing drills, security training.
  7. Incident Response → predefined IR playbooks for system compromises.

12. Real-World Case Studies

13. Key Takeaways

Exam Tip: If a question asks about hiding data inside files, the answer is Steganography. If it’s about hiding processes and registry keys, the answer is Rootkits.

Closing Notes (Modules 4–6)

Enumeration (Module 4) teaches that information is power. Attackers can do more damage with detailed usernames and network shares than with simple IP scans.

Vulnerability Analysis (Module 5) emphasizes that not all vulnerabilities are equal. Prioritization (CVSS, exploitability, business impact) is key for both attackers (choosing easy entry points) and defenders (patch management).

System Hacking (Module 6) demonstrates the life cycle of compromise. Attackers follow a systematic flow—gain access, escalate, hide, maintain—and defenders must disrupt any link in this chain to prevent damage.

Key Takeaways Across Modules 4–6:

1. Attackers move methodically—data gathering before exploitation.

2. Enumeration reveals the “who/what/where” of the target—users, shares, services.

3. Vulnerability scanning bridges the gap between knowledge and action.

4. Exploitation doesn’t end at entry—privilege escalation and persistence are equally dangerous.

Memory Hook:

-》EVA-SH → Enumeration → Vulnerability Analysis → System Hacking.
-》This sequence is at the core of CEH methodology and will appear in exam scenarios.

Exit mobile version