Coder Social home page Coder Social logo

undergroundwires / ceh-in-bullet-points Goto Github PK

View Code? Open in Web Editor NEW
891.0 891.0 267.0 3.78 MB

πŸ’» Certified ethical hacker summary in bullet points

Home Page: https://cloudarchitecture.io/hacking

License: Creative Commons Attribution 4.0 International

cehv11 certified-ethical-hacker enumeration footprinting malware-overview penetration-testing

ceh-in-bullet-points's People

Contributors

anirudhkk avatar brimford avatar salem73616c656d avatar undergroundwires avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

ceh-in-bullet-points's Issues

Scanning Networks / Banner Grabbing - Nmap syntax

In Banner Grabbing Tools sections says:
"nmap -0 for OS automatic fingerprinting" but I think it should be "nmap -O " according to Nmap.org.

It could be a silly thing that has to do with github font or my browser (if so, I'm sorry for bringing this up) but might generate some confusion for newbies like me.
Thanks for the resources!

ARP poisoning attack steps

I think in the line "e.g. through host discovery using nmap e.g. nmap -sn 192.168.0.0" the Nmap scan is missing /16

Reader-friendly modifications - help needed ?

Thanks for your effort!
However it's not very reader-friendly - have you thought about using any docs system for your project ? (with reading mode, etc ?).
Would you like your repo to be converted into reader-friendly site? (I thought about mkdocs with material).
This would adding indexes to files & commiting some code from mkdocs. Here is example screenshot of what I tried locally.

Note the features:

  • index on the left (unordered due to alphabetical sorting)
  • chapters on the right
  • page changes on the bottom

Please let me know if I should start working on it.
Then you can publish it on github pages & everyone can look at it in more reader-friendly mode.

image

IoT Architecture Layers

IoT Architecture Layers have a different structure in the v11 book (No mention to business layer there, instead Access Gateway Layer is defined). This is often included in exam prep questions; Usually a definition is given and a name is required.

5 Layers of IoT Architecture are:

Edge Technology Layer
This layer consists of all the hardware components, including sensors, radio-frequency identification (RFID) tags, readers, or other soft sensors, and the device itself. These entities are the primary part of the data sensors that are deployed in the field for monitoring or sensing various phenomena. This layer plays an important part in data collection, and in connecting devices within the network and with the server.

Access Gateway Layer
This layer helps to bridge the gap between two endpoints, such as a device and a client. The initial data handling also takes place in this layer. This layer carries out message routing, message identification, and subscribing.

Internet Layer
This is a crucial layer as it serves as the main component in carrying out communication between two endpoints, such as device-to-device, device-to-cloud, device-to-gateway, or back-end data sharing.

Middleware Layer
This is one of the most critical layers that operates in two-way mode. As the name suggests, this layer sits in the middle of the application layer and the hardware layer, thus behaving as an interface between these two layers. It is responsible for important functions such as data management, device management, and various issues like data analysis, data aggregation, data filtering, device information discovery, and access control.

Application Layer
This layer, placed at the top of the stack, is responsible for the delivery of services to the relevant users from different sectors, including building, industrial, manufacturing, automobile, security, healthcare, etc.

just a small fix

Thank you for that awesome repo!

03-scanning-networks/scanning-networks-overview.md

  • IP supports more addresses should be:
  • IPv6 supports more addresses (than IPv4)

Denial of Service / RST Attack

I think the sentence "Computer B in that case can send RST packet to computer B." needs to be reviewed. Author probably meant "to computer A"

Small Typo

/07-malware/trojans.md

Line 123

  • software that's intend t find it
  • software that's intended to find it

Security Threats and Attacks

1.i.b Discusses OS attacks. One line states that unpatched operating systems can allow for zero days. If they are vulnerable due to a known issue that has a patch, it is not a zero day. Clarification is necessary to avoid confusion for new learners.

help

hey thanks for developing it can you help me by sending a video tutorial how to use it?

Cloud attacks addition: Cloud Hopper and Cloudborne

In Cloud attacks I would add a couple more that are included in official course-ware (v11) and show in exam prep questions:

Cloud Attacks: Cloud Hopper Attack
Cloud Hopper attacks are triggered at the managed service providers (MSPs) and their users
Attackers initiate spear-phishing emails with custom-made malware to compromise the accounts of staff or cloud service firms to obtain confidential information

Cloud Attacks: Cloudborne Attack
Cloudborne is a vulnerability residing in a bare-metal cloud server that enables the attackers to implant a malicious backdoor in its firmware. The malicious backdoor can allow the attackers to bypass the security mechanisms and perform various activities such as watching new user’s activity or behavior, disabling the application or server, and intercepting or stealing the data.
Vulnerabilities in the bare-metal cloud server and inappropriate firmware re-flashing can pave the way for attackers to install and maintain backdoor persistence.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.