According to some people that have performed Certified Ethical Hacker (CEH) Practical exam, they say that most of the scenarios are based on exercises presented on CEH iLabs, that are included in the official CEH iLearn Course. So for CEH Practical exam candidates, it is important to know and handle all tools that are featured in these labs.
This post tries not to be just a plain list of all tools as they appear in the course, but I have tried to organized them according to the phase of hacking where they would belong. The phases of hacking, according to CEH, are:
- Reconnaissance
- Scanning
- Gaining access
- Maintaining access
- Clearing tracks
Nevertheless, some exercises fall out of any of these phaes. That would be the case for DoS attack or defensive actions; if this is the case they are listed separated from the others.
This post pretends to be a guide so, when a hacking challenge is presented during CEH exam, exam candidate has a list of available tools to complete it. It wants to be useful also to check exam candidate readiness before the exam.
CEH tools by attack/defense phase
Penetration Attack Phases
In a penetration attack, or standard hacking attack, the aim is to control the target computer.
Reconnaissance
Ping a target
- ping (Windows command)
Calculate TTL
-
tracert (Windows command)
-
Network Mapping
-
Path Analyzer Pro (Windows app)
-
Web Mirroring
- HTTTrack (Windows app)
- Social Engineering Tool (SET) (Linux command line)
Scanning
- Sniffing / Packet Capture
- Wireshark (Windows, Linux app)
Traffic Analyzer
- Capsa Network Analyzer (Windows)
- Network Scanning
- MegaPing (Windows app)
- NetScanTools Pro (Windows app)
- Solar Network Topology Mapper (Windows app)
- Angry IP Scanner (Windows app)
- Global Network Inventory (Windows app)
- Softperfect Network Scanner (Windows app)
- Metasploit > nmap (Linux command line)
- Metasploit > smb_versions (Linux command line)
- Packet Crafting / Port Scanning
- nmap (Linux command)
- Zenmap (Windows app; GUI for nmap)
- hping3 (Linux command)
- ping (Windows command)
- ping (Ubuntu command)
- Cola Soft Packet Builder (Windows app)
- IP-Tools (Windows app)
- NetBIOS Enumeration
- Advanced IP Scanner (Windows app)
- SuperScan (Windows app)
- NetBIOS Enumerator (Windows app)
- nbtstat (Windows command)
- SNMP Enumeration
- nmap
- Metasploit
- LDAP Enumeration
- ADExplorer (Windows app)
- Host Characteristics Enumeration
- enum4linux (Linux command)
- Host Resources Enumeration
- Hyena (Windows app)
- Vulnerability Scanning
- Nessus (Windows app)
- Nikto (Linux app)
- WebServer Vulnerability Scanner
- N-Stalker Tool (M15e02)
- Acunetix Website Vulnerability Server (WVS) (M14e05)
- Vega (M14e04)
- Webserver footprinting
- Netcat / nc (Linux command line)
- Skipfish (Linux command line)
- Uniscan (LInux command line
- httprecon (Windows app)
- ID Serve (Windows app)
- Find hidden content in web servers
- OWASP dirbuster (Linux app)
- Sniffing / Packet Capture
Gaining Access
- Bypass firewall
- nmap -sI (zombie attack) (Linux)
- HTTHost / HTTPort
- Dump Windows hash tables
- wmic (Windows command line)
- PwDump7 (Windows app)
- metasploit > post/windows/gather/smart_hashdump (Linux command line)
Get dump hashes from LLMNR-NBTNS
- responder (Linux command line)
- Generate rainbow tables
- Winrtgen (Windows app)
- Crack Windows hash tables
- john (Linux command line) (in combination with responder hashes)
- ophcrack (Windows app) (in combination with PwDump7 hashes and tables made with another program)
Compare rainbow tables with hashes
- RainbowCrack (Windows app)
- Control from command line shell
- metasploit > reverse_tcp
- Backdoor Creator
- msfvenom (Linux command line) (controled by metasploit > reverse_tcp)
- TheFatRat (Linux command line) (controled by metasploit > reverse_tcp)
- HTTP RAT (Windows app) (controlled by HTTP RAT server)
- MoSucker (Windows app)
- njRAT Builder (Windows app) (controlled by njRAT Manager)
- SwayzCryptor (Windows app) (controlled by njRAT Manager)
- ProRat (Windows)
- Theef Server (Windows app) (controlled by Theef Client)
- RAT
- metaspoit > reverse_tcp and TightVNC
- HTTP RAT
- MoSucker
- njRAT
- ProRat
- Theef Client
- Worm Maker
- Internet Worm Maker Thing (Windows)
- Creater user
- net (Windows command line)
- Spoof MAC Adress / ARP Poisoning
- SMAC (Windows app)
- Cain & Abel (Windows app)
- Session Hijacking Proxies to intercept or alter data/cookie
- Burp proxy (Linux app)
- OWASP Zed Attack Proxy (ZAP)
- FTP Password cracking
- Hydra
- Web Server Attack
- Armitage (Linux, app) (GUI for metasploit)
- Social Engineering
- Social Engineering Tool (SET) (Linux command line)
- Get WordPress Usernames
- WPScan (Linux command line)
- Crack WordPress Passwords
- metasploit > wordpress_login_enum
- SQL Injection Attack
- SQLMap (Linux command line) (M14e06)
- blast
- Dump Wireless data
- airodump-ng (Linux command line)
- Crack wireless
- aircrack-ng (Linux command line)
- Bypass firewall
Maintaining Access
- Privilege Escalation
- metasploit > bypassuac_foodhelper
- SpyWare
- Spytech SpyAgent
- SpyWare
- Bypass password rules
- HTTHost (Windows app)
- netsh (Windows command line)
- Privilege Escalation
Clearing Tracks
- Hide files
- NTFS streams (Windows command line)
- Steganography
- snow (Windows app)
- OpenStego (Windows app)
- QuickStego (Windows app)
- Covert channels
- cover_tcp (Linux command line)
- Modify Windows audit policy
- auditpol (Windows command line)
- Logs
- Registry values
- Hide files
Denial of Service
Denial-of-Service (DoS) is a type of attack that differs from the standard hacking attack, where the aim is to control the target system. In the case of DoS, the objective is to impact the availability of a system.
The reconnaissance and scanning phases seen on Penetration would apply as well to a DoS attack.
- Reconnaissance
- Scanning
- DoS Attack
- SYN flood
- metasploit > auxiliary/dos/tcp/synflood (Linux command) M10e01
- hping3 (Linux command), with –flood parameter
- Other
- High Orbit Ion Cannon (HOIC) (Windows app)
- SYN flood
Information Security Aspects
This section covers the defensive tools seen on CEH.
Audit System Passwords
L0phtCrack (Windows)
Static Malware Analysis
IDA Disassembler
OllyDBg
Detect ARP Attacks
Wireshark (M08e05)
XARP Tool (M08e06)
Dynamic Malware Analysis / Detecting Trojans in your computer
TCPView (Windows app)
autoruns (Windows app)
CurrPorts (Windows app)
Startup program Monitoring
WinPatrol
Antivirus and antimalware
Windows Defender
j16 PowerTools (Windows app)
ClamWin Antivirus
Windows Registry Monitoring
regshot
Intrusion Detection System (IDS)
Snort
Honeypot
HoneyBOT (Windows)
Firewall
Windows Firewall
Windows command netsh
Server Configuration
Internet Information Service (ISS) / inetmgr (Windows)
Calculate hash
HashCalc
MD5 Calculator
Text/file encryptor
Cryptoforge (Windows app)
BCTextEncoder (Windows app)
CrypTool (Windows app)
Disk Encryption
VeraCrypt (Windows app)
Top apps
The top 5 applications that you need to master for CEH Practical exam, as they are ones of the most used, are the following:
- nmap / Zenmap
- Wireshark
- Burp Suite
- Cain
- metasploit (it is very present in iLabs exercises, but I am not sure if it is requested during exam)