This document provides an introduction to certified ethical hacking (CEH). It explains that CEHs locate and repair security vulnerabilities to prevent exploitation by hackers. The document then outlines the typical steps for a penetration test: preparation, footprinting, enumeration and fingerprinting, identifying vulnerabilities, attacking by exploiting vulnerabilities, covering tracks, and reporting. It provides details on techniques used at each step like port scanning, banner grabbing, brute force password attacks, and using tools like Nmap and Metasploit. The document concludes with an overview of additional important hacking techniques like social engineering, denial of service attacks, and cryptography.
Related topics: