My CEH notes from “CEH V10 Study Guide” Book

Information I got from “Assessment test”:-

To compute CIDR from subnet mask:-

we convert the number to binary and count the ones

To compute CIDR from IP address given the number of hosts:-

we do it by trying each CIDR until we get close to the given number of hosts

To do that First:- subtract the given number of hosts from 32 which is the total number of hosts.

Second:- calculate 2 power result of first step

Third :-subtract 2 from the result of second step

we do that because the first ip address is all 0sand the last ip address is all 1s

NIST’s cybersecurity framework Function:-

It has 5 functions

1.Identify 2.Protect 3.Detect 4.Response 5.Recovery

Information I got from “Chapter 1: Ethical Hacking”-> Not part of CEH exam:-

Ethical Hacking Methodology(=steps):-

  1. Reconnaissance and Footprinting:-

Reconnaissance: is gathering information about the target.

Footprinting: is getting an idea of the target, the size and appearance.

2. Scanning and Enumeration:-

which means find the accessible systems in the target’s network and get additional information about the targets’ systems such as opening ports, operating systems… etc.

3. Gaining Access:-

Exploit a vulnerability to gain access to a system.

4.Maintaining Access:-

Have permanent access to the compromised system without starting with the first stage(Reconnaissance and Footprinting).

5. Covering Tracks:-

To delete or hide evidences of compromising(hacking, gaining access to) the system including systems’ logs.

I’m sorry I will complete the rest of my notes later…


created 8 September 2020

edited 14 September 2020




Love podcasts or audiobooks? Learn on the go with our new app.

Enabling Secure HTTP for BBC Online — Media

Alleged vDOS Owners Poised to Stand Trial

The front page of vDOS, when it was still online last year.

How to earn 100 cocos daily with cocos-bcx bounty site

US-CERT Warns HTTPS Inspection May Degrade TLS Security

mStable Governance Updates — 28 March 2022

{UPDATE} Pop Music Quiz - 2010+ Edition Hack Free Resources Generator

Read The Privacy Policy!

FDT Vesting Guide for 1st Pre-Sale Participants

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


More from Medium

MY FIRST VULNERABILITY; The One that got away

Let’s learn WebApp Pentest from basic on DVWA. From setup to hack. Part4. CSRF (low to high).

OSINT: Do I have to Capture The Flag? Pt2.

A building leaning out over a precipice. Someone built something that just about does the job but probably won’t stand up. Much like the simple OSINT CTF we’ll be building. Just a bit of fun really.

Proving Grounds Quick Tips