CEH Handwritten Notes (Corrected)
Introduction to CEH (Certified Ethical Hacker):
- Ethical hacking involves identifying vulnerabilities in systems to secure them.
- Legal compliance and proper authorization are mandatory.
- Hackers are classified into White Hat, Black Hat, and Grey Hat.
Footprinting and Reconnaissance:
- Methods include passive (like WHOIS, Google search) and active reconnaissance (like
Nmap scans).
- Tools: WHOIS, Nslookup, Nmap, Maltego, Shodan.
- Gathering information helps in planning effective penetration tests.
Scanning Networks:
- Types of scans: SYN scan (stealthy), ACK scan (firewall rules), Xmas scan (detecting open
ports).
- Identifying live hosts, services, and potential vulnerabilities.
- Tools: Nmap, Angry IP Scanner.
Enumeration:
- Extracting details about user accounts, network resources, shares, and services.
- Tools: NetBIOS, SNMPwalk, LDAP enumeration, NBTScan.
- This phase provides data for exploiting vulnerabilities.