# Practical Ethical Hacker Notes

## Exam Details⏳📚 <a href="#ejpt-exam" id="ejpt-exam"></a>

* **Exam Title**: Certified Ethical Hacker (Practical)
* **Number of Practical Challenges**: 20
* **Exam Duration**: 6 hours
* **Exam Infrastructure**:  iLabs (browser-based)
* **Exam Format**: iLabs Cyber Range
* **Passing Score**: 70% (14 Questions out of 20)
* **Certificate validity**: 3 years

### Course Content 📄🖊️ <a href="#ember40" id="ember40"></a>

1. Introduction to Ethical Hacking
2. [Footprinting & Reconnaissance](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/2-footprinting-and-recon)
3. [Scanning Networks](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/3-scanning-networks)
4. [Enumeration](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/4-enumeration)
5. [Vulnerability Analysis](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/5-vulnerability-analysis)
6. [System Hacking](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/6-system-hacking)
7. [Malware Threats](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/7-malware)
8. [Sniffing](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/8-sniffing)
9. Social Engineering
10. [DoS](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/10-dos)
11. [Session Hijacking](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/11-session-hijacking)
12. Evading IDS, Firewalls, and Honeypots
13. [Hacking Web Servers](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/13-hacking-web-servers)
14. [Hacking Web Applications](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/14-hacking-web-apps)
15. [SQL Injection](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/15-sql-injection)
16. [Hacking Wireless](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/16-hacking-wireless)
17. [Hacking Mobile Platform](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/17-hacking-mobile)
18. [IoT and OT Hacking](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/18-iot-and-ot-hacking)
19. [Cloud Computing](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/19-cloud-computing)
20. [Cryptography](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/main-contents/20-cryptography)

## Tools 🛠️

* [Adb tool](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/adb-tool)
* [BCTextEncoder](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/bctextencoder)
* [Burp Suite](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/burp-suite)
* [Cewl](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/cewl)
* [Crunch](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/crunch)
* [Dirb](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/dirb)
* [Enum4linux](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/enum4linux)
* [Gobuster](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/gobuster)
* [Hashcalc](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/hashcalc)
* [Hashcat](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/hashcat)
* [Hping3](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/hping3)
* [Hydra](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/hydra)
* [John the Ripper](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/john-the-ripper)
* [Metasploit](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/metasploit)
* [Md5 Calculator](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/md5-calculator)
* [Nikto](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/nikto)
* [Nmap](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/nmap)
* [OpenStego](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/openstego)
* [QuickStego](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/quickstego)
* [RainbowCrack](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/rainbowcrack)
* [Responder LLMNR](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/responder-llmnr)
* [Searchsploit](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/searchsploit)
* [Snow](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/snow)
* [Stego](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/stego)
* [Sqlmap](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/sqlmap)
* [Steghide](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/steghide)
* [Stegimage](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/stegimage)
* [Veracrypt](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/veracrypt)
* [Wireshark or Tcpdump](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/wireshark-or-tcpdump)
* [Wpscan](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/wpscan)
* [Zap](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/tools/zap)

### **How to enroll for CEH Practical?** 🔗📔

Go to the EC-Council official website and read through everything you need to know <https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh-practical/>&#x20;

Create Account: Create an account on EC-Council's Aspen portal.

Purchase Voucher: Buy a CEH Practical exam voucher from the EC-Council or authorized centers.

You can buy the voucher from the official store i.e. <https://store.eccouncil.org/product/ceh-practical-exam/>&#x20;

Or you can fill out the form from the official website and you will get the whole guide via call or text (I personally prefer this way as you can ask your doubts and they help us understand)

Schedule Exam: Log in to Aspen, select an exam date, and schedule the exam.

## Preparation RoadMap 🛣️

* [Study Walkthrough](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/study-walkthrough) 📜
* [Labs - Exercises](https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes/study-walkthrough/labs-and-training) 🧪

## [Cheat Sheet ](https://app.gitbook.com/s/PNcjhcAuvH4mlZKYrNu3/ejpt-cheat-sheet)📔

{% content-ref url="<https://app.gitbook.com/s/PNcjhcAuvH4mlZKYrNu3/ejpt-cheat-sheet>" %}
[eJPT Cheat Sheet](https://app.gitbook.com/s/PNcjhcAuvH4mlZKYrNu3/ejpt-cheat-sheet)
{% endcontent-ref %}

### Tips <a href="#id-91e1" id="id-91e1"></a>

*1) First finish linux based questions like nmap etc and save those in the desktop folder, believe me you will look into the nmap scans over and over again.*\
\&#xNAN;*2) Watch the ilab videos from youtube and reffer CEH practical Lab manual.*\
\&#xNAN;*3) Everything will be asked from the ilab videos nothing will be out of sylabus.*

The Username and Password file will be present in the parrot machine it will help you to crack the ftp and wordpress related questions.

Don’t be nervous, you are going to pass the exam with no doubt. Patience is really needed for the exam because the parrot machine is outdated and its very slow.

**Exam Experience:**

I know this is the most awaited part. The exam is watched over by a person called a proctor. They use GoToMeeting, a program that sees and hears you through your computer. They'll also record what's on your screen during the whole exam. After your identity is verified, your exam starts.

The exam is on a website called iLab. You don't need to worry about taking pictures of your virtual machines (VMs).

You'll get two Operating systems to test things on. One is Parrot OS, and the other is Windows 11. No more Kali this time.&#x20;

**You can DO** use the internet for the exam. You can look things up, take notes on your computer, watch videos, and read blogs. **But DON”T** write notes by hand, talk to people, or make calls.

Your exam computers won't have regular internet access. You need to use your web browser to access the internet.

* Start with the scanning part (NMAP Scan), since the scanning part takes some time, I moved on to other hacking questions.
* Scan all ports on IPs because default scripts might not catch smart configurations.

## Other resources 🕸️📘

{% embed url="<https://www.stationx.net/hacking-tools-cheat-sheet/>" %}

{% embed url="<https://github.com/CyberSecurityUP/Guide-CEH-Practical-Master>" %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://dev-angelist.gitbook.io/practical-ethical-hacker-ceh-tools/practical-ethical-hacker-notes.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
