This post pretends to be a guide so, when a hacking challenge is presented during CEH exam, exam candidate has a list of available tools to complete it. That would be the case for DoS attack or defensive actions if this is the case they are listed separated from the others. Nevertheless, some exercises fall out of any of these phaes. The phases of hacking, according to CEH, are: This post tries not to be just a plain list of all tools as they appear in the course, but I have tried to organized them according to the phase of hacking where they would belong. So for CEH Practical exam candidates, it is important to know and handle all tools that are featured in these labs. According to some people that have performed Certified Ethical Hacker (CEH) Practical exam, they say that most of the scenarios are based on exercises presented on CEH iLabs, that are included in the official CEH iLearn Course.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |