0% found this document useful (0 votes)
417 views1 page

CEH Handwritten Notes

The document outlines key concepts related to Certified Ethical Hacking (CEH), emphasizing the importance of legal compliance and the classification of hackers. It details methods and tools for footprinting, reconnaissance, network scanning, and enumeration to identify vulnerabilities in systems. Each phase is crucial for planning effective penetration tests and exploiting potential weaknesses.

Uploaded by

Fan Chan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
417 views1 page

CEH Handwritten Notes

The document outlines key concepts related to Certified Ethical Hacking (CEH), emphasizing the importance of legal compliance and the classification of hackers. It details methods and tools for footprinting, reconnaissance, network scanning, and enumeration to identify vulnerabilities in systems. Each phase is crucial for planning effective penetration tests and exploiting potential weaknesses.

Uploaded by

Fan Chan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

CEH Handwritten Notes (Corrected)

Introduction to CEH (Certified Ethical Hacker):

- Ethical hacking involves identifying vulnerabilities in systems to secure them.

- Legal compliance and proper authorization are mandatory.

- Hackers are classified into White Hat, Black Hat, and Grey Hat.

Footprinting and Reconnaissance:

- Methods include passive (like WHOIS, Google search) and active reconnaissance (like
Nmap scans).

- Tools: WHOIS, Nslookup, Nmap, Maltego, Shodan.

- Gathering information helps in planning effective penetration tests.

Scanning Networks:

- Types of scans: SYN scan (stealthy), ACK scan (firewall rules), Xmas scan (detecting open
ports).

- Identifying live hosts, services, and potential vulnerabilities.

- Tools: Nmap, Angry IP Scanner.

Enumeration:

- Extracting details about user accounts, network resources, shares, and services.

- Tools: NetBIOS, SNMPwalk, LDAP enumeration, NBTScan.

- This phase provides data for exploiting vulnerabilities.

You might also like