# Certified Ethical Hacker (C|EH)(Practical)

![Logo of Certified Ethical Hacker (Practical) | C|EH (Practical)](https://146382273-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTnYLydS0JgZzHeOY4n38%2Fuploads%2FfRxKHeGTbcuZFYTmOoyD%2FCEH-Practical-Logo.gif?alt=media\&token=e2a20500-7cbc-4820-841b-dac1de57e2a8)

## Introduction

**Hey there!👋🏻** Welcome to my notes If you are here then you are probably to pass your **Certified Ethical Hacker (Practical)** exam or to get to know about the exam. So this book guides you with all the tools, tricks procedures, notes. I used it in my preparation and during my exam.&#x20;

{% hint style="danger" %}
**Disclaimer:** You can't 100% relay this note for your exam preparation. Since I do have experience with penetration testing I might have skipped a few steps. I tried almost to add all the tools and steps in layman terms, so please get used to it and always google the stuff. Use these notes as your escape mechanism before your exam. All the tools which have mentioned in this guide may not be safe to use since some of the tools are not been maintained by the team. If any issues happen for you or for your computer, I'm not responsible.
{% endhint %}

## My Write-up

You can read my blog on [<mark style="color:red;">**how I cracked CEH (Practical) with a full score on my first attempt**</mark><mark style="color:orange;">**.**</mark>](https://thegurusec.medium.com/how-i-passed-ceh-practical-in-my-first-attempt-647926a3a0ac) Since I wrote a blog on Medium, I'm not duplicating all my content here on this page, also, it may affect the SEO rank of my website.

{% embed url="<https://thegurusec.medium.com/how-i-passed-ceh-practical-in-my-first-attempt-647926a3a0ac>" %}

## Page of Content&#x20;

{% content-ref url="certified-ethical-hacker-practical/reconnaissance-footprinting" %}
[reconnaissance-footprinting](https://book.thegurusec.com/certifications/certified-ethical-hacker-practical/reconnaissance-footprinting)
{% endcontent-ref %}

{% content-ref url="certified-ethical-hacker-practical/scanning-networks" %}
[scanning-networks](https://book.thegurusec.com/certifications/certified-ethical-hacker-practical/scanning-networks)
{% endcontent-ref %}

{% content-ref url="certified-ethical-hacker-practical/enumeration" %}
[enumeration](https://book.thegurusec.com/certifications/certified-ethical-hacker-practical/enumeration)
{% endcontent-ref %}

{% content-ref url="certified-ethical-hacker-practical/vulnerability-analysis" %}
[vulnerability-analysis](https://book.thegurusec.com/certifications/certified-ethical-hacker-practical/vulnerability-analysis)
{% endcontent-ref %}

{% content-ref url="certified-ethical-hacker-practical/system-hacking" %}
[system-hacking](https://book.thegurusec.com/certifications/certified-ethical-hacker-practical/system-hacking)
{% endcontent-ref %}

{% content-ref url="certified-ethical-hacker-practical/steganography" %}
[steganography](https://book.thegurusec.com/certifications/certified-ethical-hacker-practical/steganography)
{% endcontent-ref %}

{% content-ref url="certified-ethical-hacker-practical/sniffing" %}
[sniffing](https://book.thegurusec.com/certifications/certified-ethical-hacker-practical/sniffing)
{% endcontent-ref %}

{% content-ref url="certified-ethical-hacker-practical/sql-injection" %}
[sql-injection](https://book.thegurusec.com/certifications/certified-ethical-hacker-practical/sql-injection)
{% endcontent-ref %}

{% content-ref url="certified-ethical-hacker-practical/hacking-web-applications-and-servers" %}
[hacking-web-applications-and-servers](https://book.thegurusec.com/certifications/certified-ethical-hacker-practical/hacking-web-applications-and-servers)
{% endcontent-ref %}

{% content-ref url="certified-ethical-hacker-practical/cloud-computing" %}
[cloud-computing](https://book.thegurusec.com/certifications/certified-ethical-hacker-practical/cloud-computing)
{% endcontent-ref %}

{% content-ref url="certified-ethical-hacker-practical/cryptography" %}
[cryptography](https://book.thegurusec.com/certifications/certified-ethical-hacker-practical/cryptography)
{% endcontent-ref %}

{% content-ref url="certified-ethical-hacker-practical/the-final-note" %}
[the-final-note](https://book.thegurusec.com/certifications/certified-ethical-hacker-practical/the-final-note)
{% endcontent-ref %}

## Showcase

### Certificate:

![Certificate of Achievement - Certified Ethical Hacker (Practical)](https://146382273-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FTnYLydS0JgZzHeOY4n38%2Fuploads%2F9R5g2Wtbk22CwknJCgnx%2FECC-CEHPractical-Certificate.png?alt=media\&token=0f85b185-a197-49a3-9d6e-295a362fbb95)

### Digital Badge

You can verify my Digital Badge for authenticity here on the ASPEN portal.&#x20;

{% embed url="<https://aspen.eccouncil.org/VerifyBadge?a=BBDTKAK7dcB7IqnCSdTJc3kMsy5qYBLPzNgp9mAL4mM%3D&type=certification>" %}
Digital Badge of Guru HariHaraun
{% endembed %}

## Support Me

#### Hi Again! So I put much effort into writing Certified Ethical Hacker (Practical) Notes since they are not going to pay me, but if I get a few treats, I'd be more grateful to myself since I can use them for my hosting and server maintenance. 😁😍💝

{% embed url="<https://www.buymeacoffee.com/guruhariharaun>" %}
Support me here by buying me a coffee 😁🥰
{% endembed %}
