Site icon TheCyberThrone

CEH v13 Detailed Notes Part III

Advertisements

Introduction

Module 7 — Malware Threats

Module 8 — Sniffing

Module 9 — Social Engineering


Module 7: Malware Threats

1. Introduction

💡 Exam Tip: Expect questions that compare types of malware (virus vs worm vs trojan), propagation methods, and defenses.

2. Malware Categories & Variants

Viruses

Worms

Trojans

Ransomware

Spyware & Adware

Rootkits

Botnets

3. Malware Propagation Methods

💡 Exam Tip: Virus requires user action, worm self-replicates, Trojan disguises itself.

4. Advanced Malware Techniques

5. Malware Analysis Methods

Static Analysis

Dynamic Analysis

Memory Forensics

6. Malware Detection Tools & Frameworks

7. Real-World Malware Incidents

8. Countermeasures Against Malware

  1. Prevention
    • User awareness and phishing training.
    • Patch management.
    • Disable autorun on removable media.
    • Principle of Least Privilege (PoLP).
  2. Detection
    • Signature and behavior-based AV/EDR.
    • Centralized log analysis with SIEM (Splunk, QRadar).
    • Network anomaly detection.
  3. Response
    • Quarantine infected hosts.
    • Remove malware via AV tools.
    • Restore clean backups.
    • Conduct forensics to identify entry vector.
  4. Long-Term Defense
    • Zero Trust architecture.
    • Threat hunting programs.
    • Continuous monitoring.
    • Application whitelisting.

9. Key Takeaways

🔑 Memory Hooks for Exam:


Module 8: Sniffing

1) What is sniffing?

Core idea: if traffic is unencrypted, a sniffer can read it.

2) Passive vs Active sniffing

3) Common sniffing attack techniques (how attackers get traffic)

A. ARP poisoning / ARP spoofing (MITM on LAN)

B. MAC flooding

C. DNS spoofing / DNS cache poisoning

D. DHCP attacks

E. SSL stripping / HTTPS downgrade

F. Wireless sniffing & rogue APs

G. Fileless / memory-based capture

4) Protocols most at risk

5) Tools — short practical list + sample filters/commands

Packet capture & analysis

MITM & active tools

Wireless

Passive analysis

6) Detection & log indicators (what defenders look for)

Network indicators

Host indicators

IDS/IPS signatures and examples (conceptual)

Tools for detection

7) Countermeasures (hardening & mitigation)

Encryption & protocol hardening

Network hardening

Wireless

Host / endpoint

User / application measures

8) File/Packet analysis examples & filters

9) Legal & ethical notes

10) Quick memory hooks & summary

Module 9: Social Engineering

1. Definition & Scope

2. Why social engineering works (psychology)

Attackers exploit predictable cognitive biases and social norms:

3. Common attack vectors & techniques (with practical detail)

A. Phishing (email)

B. Vishing (voice)

C. Smishing (SMS)

D. Pretexting

E. Baiting & USB Drops

F. Quid Pro Quo

G. Tailgating / Piggybacking (physical)

H. Watering Hole

I. Business Email Compromise (BEC)

4. Reconnaissance & payload preparation (attacker side)

5. Detection indicators (red flags for defenders)

6. Practical templates & scripts (for authorized testing / red team)

Use only with written authorization.

Spear-phish subject/body template

Subject: [ProjectName] — Urgent: Action Required by EOD
Body:

Hi [Name],

We received an exception for [ProjectName] regarding the deployment scheduled today. Please review the attached “deployment-list.xls” and confirm the server IPs. If you don’t respond within 2 hours the deployment will be delayed.

— [Fake IT Lead Name] | IT Operations

Vishing template

“Hello [Name], this is [IT helpdesk] — we’re doing a critical update and I see your machine hasn’t checked in. Can I have your temporary admin password so I can push the patch? This will take less than a minute.”

Tailgating script

“Sorry, I left my badge in the car — can you hold the door for me? I’m with the [vendor name].”

7. Tools commonly used (for testing and for defenders)

8. Technical controls & prevention (detailed)

Email & Messaging

Authentication & Account Defense

Network & Endpoint

Telephony

Physical

9. Process & organizational controls

10. Training, metrics & continuous improvement

Training

Metrics (KPIs)

Lessons & Feedback

11. Incident response for suspected social engineering breach

  1. Isolate affected accounts/workstations.
  2. Preserve evidence (emails, call logs, session logs).
  3. Reset credentials & revoke sessions/MFA tokens.
  4. Identify scope (where else credentials used).
  5. Notify legal, HR, leadership, and potentially affected third parties.
  6. Remediate (patch, block malicious domains, update policies).
  7. Lessons learned: update training and technical controls.

12. Quick reference cheatsheet

Exit mobile version