CEH V13
CEH V13
NO
1
1.1
1.2
1.3
1.4
1.5
1.6
2
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
3
3.1
3.2
3.3
3.4
3.5
3.6
4
4.1
4.2
4.3
4.4
4.5
4.6
4.7
5
5.1
5.2
5.3
6
6.1
6.2
6.3
6.4
7
7.1
7.2
7.3
7.4
7.5
8
8.1
8.2
8.3
8.4
9
9.1
9.2
9.3
9.4
9.5
10
10.1
10.2
10.3
11
11.1
11.2
11.3
11.4
12
12.1
12.2
12.3
12.4
12.5
12.6
13
13.1
13.2
13.3
13.4
14
14.1
14.2
14.3
14.4
14.5
15
15.1
15.2
15.3
15.4
15.5
16
16.1
16.2
16.3
16.4
16.5
17
17.1
17.2
17.3
17.4
17.5
18
18.1
18.2
18.3
18.4
18.5
19
19.1
19.2
19.3
19.4
19.5
19.6
19.7
19.8
20
20.1
20.2
20.3
20.4
MODULES
Introduction to Ethical Hacking
Information Gathering Overview
Hacking Concepts and Hacker Classes
Ethical Hacking Concepts
Hacking Methodologies and Frameworks
Information Security Controls
Information Security Laws & Standards
Footprinting & Reconnaissance
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Internet Research Services
FootPrinting through Social Networking Sites
Whois Footprinting
DNS Footprinting
Networking and Email Footprinting
Footprinting through Social Engineering
Footprinting Tasks using Advanced Tools & AI & Footprinting Countermeasures
Scanning Networks
Network Scanning Concepts
Host Discovery
Port and Service Discovery
OS Discovery
Scanning Beyond IDS & Firewalls
Network Scanning Countermeasures
Enumeration
Enumeration Concepts
NETBIOS Enumeration
SNMP and LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures
Vulnerability Analysis
Vulnerability Assessment Concepts
Vulnerability Assessment Tools
Vulnerability Assessment Reports
System Hacking
Gaining Access
Escalating Privileges
Maintaining Access
Clearing Logs
Malware Threats
Malware and APT Concepts
Fileless Malware Concepts
AI - Based Malware Concepts
Malware Analysis
Malware Countermeasures
Sniffing
Sniffing Concepts
Sniffing Techniques
Sniffing Tools
Sniffing Countermeasures
Social Engineering
Social Engineering Concepts
Human-Based Social Engineering Techniques
Computer-Based Social Engineering Techniques
Mobile-Based Social Engineering Techniques
Social Engineering Countermeasures
Denial - of - Service
DoS/DDoS Concepts
DoS/DDoS Attack Techniques
DoS/DDoS Attack Countermeasures
Session -Hijacking
Session -Hijacking Concepts
Application - Level Session -Hijacking
Network-Level Session-Hijacking
Session -Hijacking Countermeasures
Evading IDS , Firewalls & Honeypots
IDS, IPS and Firewall Concepts
IDS, IPS and Firewall Solutions
Evading IDS /Firewalls
Evading NAC and Endpoint Security
Honeypot Concepts and Detecting Honeypots
IDS/Firewall Countermeasures
Hacking Web Servers
Web Servers Concepts
Web Servers Attacks
Web Servers Attack Methodology
Web Servers Attack Countermeasures
Hacking Web Applications
Web Applications Concepts
Web Applications Threats
Web Applications Hacking Methodology
Web API & Webhooks
Web Application Security
SQL Injection
SQL Injection Concepts
Types SQL Injection
SQL Injection Methodology
Evasion techniques
SQL Injection Countermeasures
Hacking Wireless Networks
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Attack Countermeasures
Hacking Mobile Platforms
Mobile Platform Attakc Vectors
Hacking Android OS
Hacking IOS
Mobile Device Management
Mobile Security Guidelines and Tools
IoT and OT Hacking
IoT Hacking Methodology
IoT Attack Countermeasures
OT Concepts and Attacks
OT Hacking Methodology
OT Attack Countermeasures
Cloud Computing
Cloud Computing Concepts
Cloud Computing threats
Cloud Hacking
AWS Hacking
Micorsoft Azure Hacking
Google Cloud Hacking
Container Hacking
Cloud Security
Cryptography
Cryptography Concepts and Encryption Algorithms
Applications of Cryptography
Cryptanaylsis Methods and Cryptogrraphy Attacks
Cryptography Attack Countermeasures
COMPLETED NOT COMPLETED Tools
Kali Linux, BackBox
Nmap,Maltego
Metasploit Framework
OWASP ZAP
ExploitDB
Lynis, DenyHosts
OpenSCAP
measures
CEH VERSION 13
Links
Official Site: https://www.kali.org/, Official Site: https://www.backbox.org/
https://github.com/nmap/nmap, https://github.com/paterva/maltego
https://github.com/rapid7/metasploit-framework
https://github.com/zaproxy/zaproxy
Official Site: https://www.exploit-db.com/
https://github.com/CISOfy/lynis, https://github.com/denyhosts/denyhosts
https://github.com/OpenSCAP/openscap, GitHub: https://github.com/cyberguideme/Tools
Other Tools
Zmap, Trivy, Tracee,Kube-bench, Kube-hunter, tfsec,OneFuzz, BloodHound, RITA ,. Infec
Ghidra
Semgrep
MISP Threat Sharing
Dshell
OpenEDR
Nmap, Masscan, Angry IP Scanner, Netdiscover, Fping, Hping3, ARP-scan, Ping, ZMap, Uni
Nmap, Nessus, OpenVAS, Nikto, Burp Suite, ZAP (Zed Attack Proxy), Metasploit, Nexpose,
Metasploit, Mimikatz, Empire, CrackMapExec, Hydra, John the Ripper, Hashcat, Medusa, Pw
YARA, ClamAV, Cuckoo Sandbox, PEStudio, Ghidra, Radare2, REMnux, Volatility, Procmon,
Wireshark, Tcpdump, Ettercap, Tshark, MITMf, Bettercap, Dsniff, URLsnarf, Driftnet, ARPsp
Social-Engineer Toolkit (SET), Evilginx2, GoPhish, Zphisher, BlackEye, HiddenEye, King Phi
Hping3, LOIC, HOIC, Slowloris, R-U-Dead-Yet (RUDY), GoldenEye, Xerxes, Torshammer, Hul
Ettercap, Bettercap, Burp Suite, Wireshark, Tcpdump, MITMf, SSLStrip, Hamster & Ferret,
Nmap (IDS Evasion), Hping3, Scapy, Firewalk, Netcat, Socat, ProxyChains, Tor, Slowloris, M
Nmap, Nikto, Wapiti, OpenVAS, Metasploit, Burp Suite, OWASP ZAP, Dirb, Dirbuster, Gobu
Burp Suite, OWASP ZAP, Sqlmap, Commix, Xsser, Metasploit, Nmap, Nikto, Wapiti, Arachn
Sqlmap, NoSQLMap, BBQSQL, SQLNinja, jSQL Injection, Mole, Havij, Leviathan, Whitewidow
Aircrack-ng, Reaver, Bully, Wifite, Fern Wifi Cracker, Kismet, Wash, Hcxdumptool, Hcxpcap
Metasploit, Msfvenom, Evil-Droid, AndroRAT, AhMyth, Drozer, APKTool, JADX, MobSF (Mob
Pacu, AWS CLI, GCP CLI, Azure CLI, CloudBrute, Cloud_enum, S3Scanner, S3BucketList, Sky
John the Ripper, Hashcat, Hydra, Medusa, Ophcrack, RSMangler, CeWL, Crunch, RainbowCr
Osquery,Gophish, Prowler,ScoutSuite,TruffleHog,. DumpsterFire, Artillery,Sysmon,Atomic Red Team
raft, OSINT Framework, ThreatCrowd, GreyNoise, IntelX, CheckUsernames, Sherlock, Maltego, Soci
RustScan, PortQry, Scanless, SNMPCheck, Xprobe2, p0f, SinFP, OS-Detect, Scapy, Firewalk, ProxyC
um, NTPQ, NFS-Common, Showmount, Rpcclient, Dig, Host, Fierce, DNSRecon, DNSEnum, SMTP-Us
etix, Arachni, OpenSCAP, Lynis, Retina, Qualys, SAINT, IBM AppScan, Snyk, Dependency-Check, An
gne, Responder, Evil-WinRM, WinPEAS, LinPEAS, BeRoot, PowerSploit, Linux Exploit Suggester, Win
gshot, Wireshark, Suricata, Zeek (Bro), Hybrid Analysis, Any.Run, VirusTotal, Intezer Analyze, Falco
t, Zeek (Bro), Suricata, NetworkMiner, Chaosreader, Ngrep, PcapXray, EtherApe, Haka, Justniffer, P
DOSIM, DAVOSET, SynFlood, Nemesy, MHDDoS, Botnet Tools (Mirai, Kaiten), OWASP HTTP-DoS Tool
DroidSheep, Cookie Cadger, Scapy, ARPspoof, NetSniff-ng, Aircrack-ng, Responder, Sniffpass, Cain &
pscan, WhatWeb, Arachni, WebSploit, Commix, Xsser, Sublist3r, CloudFail, Recon-ng, Skipfish, Paro
Droopescan, FFUF, Gobuster, Dirb, Dirbuster, Sublist3r, CloudFail, Recon-ng, WebSploit, Skipfish, Pa
te, OWASP ZAP, Nmap (with NSE scripts), Sqliv, NoSQLBooster, SQLiteBrowser, GraphQLmap, Postm
ion, Bettercap, EvilTwin, Wirespy, Eaphammer, Wireshark, Tshark, MdK3, Airgeddon, CoWPAtty, Pix
k), Frida, Objection, Xposed Framework, Magisk, Termux, ADB (Android Debug Bridge), SSLSplit, Bu
te, CloudSploit, Rhino Security Labs Tools, TruffleHog, GitLeaks, Kube-Hunter, Kube-Bench, Docker
ashcat-utils, CyberChef, Gpg (GnuPG), OpenSSL, Steghide, OutGuess, Binwalk, AES Crypt, TrueCryp
n,Atomic Red Team, Caldera,Chain-bench,Kismet,Aircrack-ng,YARA,VolatilityCuckoo Sandbox,TheH
lock, Maltego, Social Mapper, Twint, SpiderFoot, PeopleDataLabs API, whois, RDAP Lookup, ICANN
y, Firewalk, ProxyChains, Tor, FOCA, Snort, Suricata, Zeek (Bro), OSSEC, Fail2Ban, PortSentry, IP Ta
DNSEnum, SMTP-User-Enum, VRFY, EXPN, theHarvester, Netcat, Nikto, Wappalyzer, WhatWeb, Ama
endency-Check, Anchore, Trivy, Chkrootkit, Rkhunter, MBSA (Microsoft Baseline Security Analyzer)
loit Suggester, Windows Exploit Suggester, Chisel, Ligolo, Netcat, Socat, Nishang, Procdump, PsEx
ezer Analyze, Falcon Sandbox, Malwoverview, Malfind, DeepBlueCLI, Snort, OSSEC, CrowdStrike, C
, Haka, Justniffer, PacketFence.
ester, Metasploit, BeeLogger, Weeman, Fierce, OSINT-Toolkit, Hunchly, OpenAI ChatGPT (AI for OSI
ASP HTTP-DoS Tool, FastNetMon, Snort, Suricata, Zeek (Bro), Fail2Ban, ModSecurity, Cloudflare, Ak
er, Sniffpass, Cain & Abel, Driftnet, Snort, Suricata, Zeek (Bro), HTTPS Everywhere, Multi-factor Aut
orphic Shellcodes, Shellter, Veil-Evasion, Unicorn, Hyperion, Snort, Suricata, Zeek (Bro), T-Pot, Cuck
n-ng, Skipfish, Paros Proxy, Httrack, Netcat, Socat, Hydra, Patator, THC-Hydra, Slowloris, Torshamm
bSploit, Skipfish, Paros Proxy, Httrack, Postman, API-Security-Scanner, JWT_Tool, NoSQLMap, Graph
GraphQLmap, Postman (for API SQLi), Tamper Data, WAFW00F, ModSecurity, Cloudflare WAF, Snor
ddon, CoWPAtty, PixieWPS, NetHunter, Rogue AP, Hostapd-WPE, Snort, Suricata, Zeek (Bro), WPA_S
ridge), SSLSplit, Burp Suite, OWASP ZAP, Wireshark, Bettercap, NetHunter, iRET (iOS Reverse Engi
sperer, HackRF, GQRX, SDR#, RFcat, Bettercap, Wireshark, Tshark, Modbus-cli, SCADA Strangelove
Kube-Bench, Dockerscan, Clair, Anchore, Falco, Kubescape, KubiScan, Aqua Trivy, Sysdig, Metasploi
AES Crypt, TrueCrypt, VeraCrypt, Ccrypt, Chntpw, Bcrypt, Fcrackzip, RarCrack, PDFCrack, Cryptsetu
ckoo Sandbox,TheHive,Cortex,MISP ,
DAP Lookup, ICANN Lookup, ViewDNS.info, CentralOps, DomainTools, dnsenum, Fierce, Nslookup, M
zer, WhatWeb, Amap, Xprobe2, p0f, Recon-ng, SpiderFoot, Wireshark, Snort, Suricata, OSSEC, Fail2
EC, CrowdStrike, Cylance, AI-Hunter, ReversingLabs, Cape Sandbox, ThreatGrid, FireEye FLARE.
ChatGPT (AI for OSINT & phishing awareness).
ek (Bro), T-Pot, Cuckoo Sandbox, Honeyd, Kippo, Cowrie, Dionaea, Conpot, Canarytokens, WAFW00F
, Zeek (Bro), WPA_Supplicant, MAC Filtering, Enterprise WPA, VPN, Radius Server.
T (iOS Reverse Engineering Toolkit), Cycript, Hopper Disassembler, Checkra1n, Snort, Suricata, OSS
SCADA Strangelove, PLCScan, Modscan, Snap7, Conpot, GasPot, GridPot, Snort, Suricata, Zeek (Bro
y, Sysdig, Metasploit, Nmap, Burp Suite, OWASP ZAP, Wireshark, Snort, Suricata, Zeek (Bro), Cloud
DFCrack, Cryptsetup, Scrypt, Wfuzz, Burp Suite, CyberChef, Snort, Suricata, Zeek (Bro), Quantum C
Fierce, Nslookup, MXToolbox, dnstracer, Sublist3r, CRT.sh, DNSDumpster, Amass, Traceroute, Nma
FireEye FLARE.
rytokens, WAFW00F, ModSecurity, Fail2Ban, IP Tables, TCP Wrappers.
Suricata, Zeek (Bro), Security Onion, Fail2Ban, FirewallD, NAC (Network Access Control), VPN, Devi
, Zeek (Bro), CloudTrail, GuardDuty, Azure Security Center, Google Security Command Center, IAM
k (Bro), Quantum Cryptography, Multi-Factor Authentication (MFA), PKI (Public Key Infrastructure)
s, Traceroute, Nmap, EmailRep.io, Have I Been Pwned, SNOV.io, Holehe, SET (Social Engineering To
Control), VPN, Device Hardening.
mmand Center, IAM Policies, Cloud WAF, CSPM (Cloud Security Posture Management).
Key Infrastructure).
cial Engineering Toolkit), Evilginx2, GoPhish, PhishTank, EvilURL, Zphisher, BlackEye, HiddenEye, R
kEye, HiddenEye, Recon-ng, Metasploit, SpiderFoot HX, OSINT-Toolkit, OpenAI ChatGPT, Hunchly, G
ChatGPT, Hunchly, GHunt, ReconAI, Tor Browser, Tails OS, CyberChef, OSINT-SANITIZER, Privacy Ba
NITIZER, Privacy Badger.