👾
Rootkid - Cyber Journal
Portfolio
  • 👩‍🚀Introduction
    • 🤖About Cyber Journal & Rootkid
    • 📜License Agreement
    • ⚠️Disclaimer
  • 📚Exam Prep Notes
    • 🗒️KLCP Exam (PEN-103) - Notes
      • 1. Linux Fundamentals
      • 2. Introduction
      • 3. About Kali Linux
      • 4. Getting Started with Kali Linux
      • 5. Installing Kali Linux
      • 6. Configuring Kali Linux
      • 7. Helping Yourself and Getting Help
      • 8. Securing and Monitoring Kali Linux
      • 9. Debian Package Management
      • 10. Advanced Usage
      • 11. Kali Linux in the Enterprise
      • 12. Introduction to Security Assessments
      • 13. Conclusion: The Road Ahead
    • 📒ISO/IEC 27001:2022 Lead Auditor - Notes
      • ISO - Training - Day - 1
      • ISO - Training - Day - 2
      • ISO - Training - Day - 3
      • ISO - Training - Day - 4
      • Practice Questions - Notes
      • Other PDF References
    • 📑Junior Penetration Tester (eJPTv2) - Notes
      • 💡Assessment Methodologies
        • 🔍Information Gathering
          • 🌏Passive Information Gathering
          • 🧐Active Information Gathering
        • 👣Footprinting & Scanning
          • 🗺️Mapping a Network
          • 🎛️Port Scanning
        • 🕵️Enumeration
          • 📜SMB Enumeration
          • 📂FTP Enumeration
          • 🐚SSH Enumeration
          • 🕸️HTTP Enumeration
          • 🗄️MySQL & MSSQL Enumeration
        • 🐛Vulnerability Assessment
          • 🩸Case Study: Heartbleed Vulnerability (CVE-2014-0160)
          • 🔵Case Study: EternalBlue Vulnerability (CVE-2017-0143)
          • 👨‍💻Case Study: Log4J Vulnerability (CVE-2021-44228)
      • 🧰Assessment Methodologies: Auditing Fundamentals
      • 📶Host & Network Penetration Testing
        • 💻System/Host Based Attacks
          • 🪟Overview Of Windows Vulnerabilities
          • 💣Exploiting Windows Vulnerabilities
            • 🧨Exploiting Microsoft IIS WebDAV
            • 🧨Exploiting WebDAV With Metasploit
            • 🧨Exploiting SMB With PsExec
            • 🧨Exploiting Windows MS17-010 SMB Vulnerability (EternalBlue)
            • 🧨Exploiting RDP - Brute Force
            • 🧨Exploiting Windows CVE-2019-0708 RDP Vulnerability (BlueKeep)
            • 🧨Exploiting WinRM
          • 📈Windows Privilege Escalation
            • 🔥Windows Kernel Exploits
            • 🔥Bypassing UAC With UACMe
            • 🔥Access Token Impersonation
          • 🗃️Windows File System Vulnerability - Alternate Data Streams
          • 💳Windows Credential Dumping
            • 🔑Searching For Passwords In Windows Configuration Files
            • 🔑Dumping Hashes With Mimikatz
            • 🔑Pass-The-Hash Attacks
          • 💎Linux Vulnerabilities
          • 🎰Exploiting Linux Vulnerabilities
            • 🐚Exploiting Bash CVE-2014-6271 Vulnerability (Shellshock)
            • 🗄️Exploiting FTP - Linux
            • 🔐Exploiting SSH - Linux
            • 📭Exploiting SAMBA - Linux
          • ‼️Linux Privilege Escalation
            • 💥Linux Kernel Exploits
            • 💥Exploiting Misconfigured Cron Jobs
            • 💥Exploiting SUID Binaries
          • 🔐Linux Credential Dumping
        • 📶Network-Based Attacks
          • 📦Tshark & Filtering Basics
          • 🕷️Arp Poisoning
        • 💣The Metasploit Framework (MSF)
        • 💥Exploitation
          • 🖲️Vulnerability Scanning
          • ⚠️Searching For Exploits
          • 🐚Bind & Reverse Shells
          • 👾Exploitation Frameworks
          • 🪟Windows Exploitation
          • 🥌Linux Exploitation
          • ☣️AV Evasion & Obfuscation
        • 🚩Post-Exploitation
          • 🌬️Windows Local Enumeration
          • 📟Linux Local Enumeration
          • 🚜Transferring Files To Windows & Linux Targets
          • 🔼Upgrading Shells
          • 👀Windows Privilege Escalation
          • ⚒️Linux Privilege Escalation
          • 🔮Windows Persistence
          • 🧙Linux Persistence
          • 〰️Dumping & Cracking Windows Hashes (NTLM Hashes)
          • 🍘Dumping & Cracking Linux Password Hashes
          • ➿Pivoting Overview
          • 🧹Clearing Your Tracks On Windows & Linux
        • 🧑‍🔬Social Engineering Fundamentals
      • 🕸️Web Application Penetration Testing
        • ℹ️Intro to Web
        • 🎯Directory Enumeration
        • 🧰BurpSuite and ZAP-Proxy Overview
        • 🛠️Nikto, SQLMap, XSSer & Hydra Overview
      • 👽Extra Resources
        • ➕CIDR Conversion Table
        • 📦Machines or Lab Solved to Practice
    • 📓Certified in Cybersecurity - (ISC)2 - Notes
      • 📝Chapter-1 Security Controls - Notes
      • 📝Chapter-2 Incident Response, Business Continuity & Disaster Recovery - Notes
      • 📝Chapter 3: Access Control Concepts - Notes
      • 📝Chapter 4: Network Security - Notes
      • 📝Chapter 5: Security Operations - Notes
    • 📕Certified Ethical Hacker v12 - Practical - Notes
      • 👣Module 02: Footprinting and Reconnaissance
      • 🔎Module 03: Enumeration
      • Module 04: Scanning Networks
      • Module 05: Vulnerability Analysis
      • 💻Module 06: System Hacking
      • 🐛Module 07: Malware Threats
      • 🧙Module 08: Sniffing
      • 🐧Module 09: Social Engineering
      • ⚠️Module 10: Denial-of-Service
      • 🪝Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls, and Honeypots
      • 🗄️Module 13: Hacking Web Servers
      • Module 14: Hacking Web Applications
      • 💉Module 15: SQL Injection
      • Module 16: Hacking Wireless Networks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT and OT Hacking
      • Module 19: Cloud Computing
      • Module 20: Cryptography
      • Extra Resources
        • 📚Helpful Resources
        • 📜Cheat Sheet
  • ✍️Blogs
    • Mastering the Art of Logic Flaws: Unraveling Cyber Mysteries !!!
    • How to write a Detailed Vulnerability Report
    • Payment Gateway Bypass on Government Domain.
Powered by GitBook
On this page
  • Certified Ethical Hacker (CEH) v12 - Practical Exam Overview
  • Who Should Take the Certified Ethical Hacker (CEH) v12 - Practical Exam?
  • Topics Covered in the Certified Ethical Hacker (CEH) v12 - Practical Exam
  • Exam Format:
  • Conclusion
  • Notes Objectives
  • Topics Covered
  • Extra Resources:

Was this helpful?

  1. Exam Prep Notes

Certified Ethical Hacker v12 - Practical - Notes

Certified Ethical Hacker (CEH) v12 - Practical Exam Overview

The Certified Ethical Hacker (CEH) v12 - Practical Exam is an essential certification for anyone looking to advance in the field of ethical hacking and cybersecurity. This exam offers a hands-on experience, allowing candidates to apply their skills in real-world scenarios. It's perfect for professionals who want to validate their ability to identify vulnerabilities, assess security systems, and implement effective solutions. Covering a wide range of technical topics, the CEH v12 - Practical Exam ensures that candidates are thoroughly prepared to tackle the challenges faced by cybersecurity experts today.

Who Should Take the Certified Ethical Hacker (CEH) v12 - Practical Exam?

The Certified Ethical Hacker (CEH) v12 - Practical Exam is ideal for:

  • IT and Security Professionals: Individuals already working in IT and looking to specialize in cybersecurity.

  • Security Enthusiasts: Anyone passionate about cybersecurity and ethical hacking, eager to gain practical, hands-on experience.

  • Students and Recent Graduates: Students and recent graduates in IT or computer science fields who want to kickstart their career in cybersecurity.

  • Beginners in Cybersecurity: Individuals who are new to cybersecurity and want to gain a strong foundation in penetration testing.

Topics Covered in the Certified Ethical Hacker (CEH) v12 - Practical Exam

  1. Information Security and Ethical Hacking: Learn the fundamentals of information security and the ethical hacking principles used to protect systems from threats. Understand the role of ethical hackers in maintaining the integrity and security of information systems.

  2. Reconnaissance Techniques: Master the methods used to gather critical information about targets, including passive and active reconnaissance techniques. Develop skills to identify vulnerabilities and potential entry points in a system.

  3. System Hacking Phases and Attack Techniques: Explore the different phases of system hacking, from gaining access to maintaining control. Study various attack techniques used by hackers to compromise systems and networks.

  4. Network and Perimeter Hacking: Understand the tactics used to exploit network vulnerabilities and bypass perimeter defenses. Gain expertise in network scanning, sniffing, and exploitation to secure network infrastructures.

  5. Web Application Hacking: Learn how to identify and exploit vulnerabilities in web applications. Focus on common attacks like SQL injection, cross-site scripting (XSS), and session hijacking.

  6. Tools/Systems/Programs: Get hands-on experience with the essential tools and software used in ethical hacking. Familiarize yourself with various hacking tools and programs that assist in vulnerability assessment and exploitation.

  7. Mobile Platform, IoT and OT Hacking: Delve into the security challenges associated with mobile platforms, Internet of Things (IoT) devices, and Operational Technology (OT). Study the techniques to identify and mitigate risks in these environments.

  8. Cloud Computing: Understand the unique security concerns and vulnerabilities in cloud computing environments. Learn how to secure cloud infrastructures and protect data in cloud services.

  9. Cryptography: Gain knowledge of cryptographic principles and techniques used to protect data. Explore different encryption methods, cryptographic attacks, and how to implement secure cryptographic solutions.

Exam Format:

  • Duration: The exam lasts 6 hours.

  • Environment: You will work in a simulated network environment.

  • Tasks: There are 20 practical tasks to complete.

  • Passing Score: To pass, you must achieve at least 70%.

Conclusion

The Certified Ethical Hacker (CEH) v12 - Practical Exam is an invaluable certification for anyone serious about advancing their career in cybersecurity. By testing your skills in real-world scenarios, it ensures you are well-equipped to handle the challenges of modern information security. Achieving this certification demonstrates your expertise and commitment to protecting digital assets in today's ever-evolving cyber landscape.


Notes Objectives

These notes are based on the course content provided by EC-Council for preparation towards the Certified Ethical Hacker (CEH) v12 - Practical Exam. The course includes both theoretical and practical learning materials. While these notes can help you pass the CEH v12 exam, it's strongly recommended that you complete the full course provided by EC-Council. This will give you a comprehensive understanding and hands-on experience with new tools, techniques, testing methodologies, and help you develop a robust mindset for ethical hacking. These notes are compiled based on my understanding and may not cover all exam content comprehensively.

Topics Covered

  • Module 02: Footprinting and Reconnaissance

  • Module 03: Enumeration

  • Module 04: Scanning Networks

  • Module 05: Vulnerability Analysis

  • Module 06: System Hacking

  • Module 07: Malware Threats

  • Module 08: Sniffing

  • Module 09: Social Engineering

  • Module 10: Denial-of-Service

  • Module 11: Session Hijacking

  • Module 12: Evading IDS, Firewalls, and Honeypots

  • Module 13: Hacking Web Servers

  • Module 14: Hacking Web Applications

  • Module 15: SQL Injection

  • Module 16: Hacking Wireless Networks

  • Module 17: Hacking Mobile Platforms

  • Module 18: IoT and OT Hacking

  • Module 19: Cloud Computing

  • Module 20: Cryptography

Extra Resources:

  • Helpful Resources

  • Cheat Sheet




Hacker's Mantra:You can do reverse engineering, but you can’t do reverse hacking. - Francis Crick

PreviousChapter 5: Security Operations - NotesNextModule 02: Footprinting and Reconnaissance

Last updated 9 months ago

Was this helpful?

📚
📕