CEH v13 Theory Notes
Modules 1-20, full CEH 312-50 exam coverage with tables, memory hooks, and exam focus.
| Module | Topic |
|---|---|
| 01 | Introduction to Ethical Hacking |
| 02 | Footprinting and Reconnaissance |
| 03 | Scanning Networks |
| 04 | Enumeration |
| 05 | Vulnerability Analysis |
| 06 | System Hacking |
| 07 | Malware Threats |
| 08 | Network Sniffing |
| 09 | Social Engineering |
| 10 | Denial of Service |
| 11 | Session Hijacking |
| 12 | Evading IDS, Firewalls and Honeypots |
| 13 | Hacking Web Servers |
| 14 | Hacking Web Applications |
| 15 | SQL Injection |
| 16 | Hacking Wireless Networks |
| 17 | Hacking Mobile Platforms |
| 18 | IoT and OT Hacking |
| 19 | Cloud Computing |
| 20 | Cryptography |
CEH v13 Practical Notes
Hands-on lab notes with screenshots, auto-synced from Obsidian.
| Section | Notes |
|---|---|
| 02 - Footprinting | Email footprinting, Google dorks, nslookup, Recon-ng, Netcraft/DNSdumpster |
| 03 - Scanning | Host discovery (nmap), Port and service discovery (nmap) |
| Cheatsheets | nmap commands, setup commands |