{"id":810,"date":"2023-01-16T22:30:00","date_gmt":"2023-01-16T22:30:00","guid":{"rendered":"https:\/\/www.microteklearning.com\/blog\/?p=810"},"modified":"2026-03-28T22:56:12","modified_gmt":"2026-03-28T22:56:12","slug":"ceh-certification-exam-cheat-sheet","status":"publish","type":"post","link":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/","title":{"rendered":"CEH Certification Exam Cheat Sheet"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"760\" height=\"480\" src=\"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-1.png\" alt=\"CEH Certification\" class=\"wp-image-813\" style=\"aspect-ratio:1.5833333333333333;width:840px;height:auto\" srcset=\"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-1.png 760w, https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-1-300x189.png 300w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><\/figure>\n\n\n\n<p>The most popular ethical hacking certification in the world and the one that cybersecurity experts choose is still&nbsp;<a href=\"https:\/\/www.microteklearning.com\/ceh-certified-ethical-hacker-training\/\" target=\"_blank\" rel=\"noreferrer noopener\">CEH Certification<\/a>&nbsp;from the EC Council. Employers around the world trust it because of its in-depth and current understanding of system vulnerabilities, penetration testing, and malware countermeasures, making it one of the most sought-after ethical hacking credentials on the market. The abilities of malevolent hackers are assumed to be possessed by those considering becoming Certified Ethical Hackers, and they must be verified by passing the CEH exam offered by the EC-Council.<\/p>\n\n\n\n<p>Even though this four-hour exam is focused on multiple-choice questions, it is still manageable with the correct planning, practice, and resources. However, those who have taken the exam frequently state that it is challenging to fully understand the vocabulary, processes, and tools. Cheat sheets for CEH are frequently utilized in these situations to help with memorizing and quickly reviewing material prior to the exam.<\/p>\n\n\n\n<p>Despite the fact that they are not exhaustively detailed guides, they are sufficient for allowing one to approach questions on instinct and better grasp them. This guide aims to give readers access to such a resource that is also current with the v13 standards. You can get a head start on the exam and get a firm understanding of the terms by using the Certified Ethical Hacking [CEH] Exam Cheat Sheet (2026) found below.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_is_a_cheat_sheet_for_CEH\"><\/span>What is a cheat sheet for CEH?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>With the newest strategies, methodologies, and technology, CEH has released the 13th version of the exam, also known as v13. The majority of the key phrases and topics that you&#8217;ll encounter on the exam are covered in the CEH v13 cheat sheet that is provided below.<\/p>\n\n\n\n<p>From the fundamental five steps of ethical hacking to more sophisticated networking, cloud, and encryption tools and terms made available for the first time in v13. This study guide was created using information taken straight from CEH v13 exam dumps, taking into account every CEH v13 exam question.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Best_Way_to_Use_a_Cheat_Sheet\"><\/span>The Best Way to Use a Cheat Sheet<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Every phrase is correctly nested in its appropriate heading and sub-header across the whole document, allowing for broad use of the search function. Start by reading over the definitions of the basic terms that are listed initially. Following through with the&nbsp;<a href=\"https:\/\/www.microteklearning.com\/ceh-certified-ethical-hacker-training\/\" target=\"_blank\" rel=\"noreferrer noopener\">CEH certification<\/a>&nbsp;modules and looking up new phrases as you come across them is another approach to move through the cheat sheet.<\/p>\n\n\n\n<p>This makes sure that as you begin to read through the complete content, you won&#8217;t suddenly feel overwhelmed with information. Please feel free to make a copy of our cheat sheet in case you need to add anything of your own. To avoid a mess, always keep it brief and to the point so that you can immediately access the terms when needed and add extra information without having to rewrite it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Importance_of_CEH_Certification\"><\/span>Importance of CEH Certification<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>One of the most current and comprehensive ethical hacking courses available, CEH is an obvious choice for anybody wishing to launch an ethical hacking profession. Getting certified has significant professional and technical advantages, but the certification itself carries a lot of weight:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Organizations all around the world are beginning to recognize the serious threat posed by cyberattacks and the necessity of employing trained personnel in their defense. The hiring process is made considerably simpler and clearer thanks to CEH, which gives them a crystal-clear understanding of the skill set of a certified worker. The significance of the CEH credential is rising as more and more organizations start requiring it for job applications.<\/li>\n\n\n\n<li>New methods, instruments, and systems are constantly being developed in the IT security industry. Unlike other certifications, CEH is regularly updated to match current industry standards. Along with employment stability, earning the certificate will give you the best opportunity to stay current with industry changes.<\/li>\n\n\n\n<li>By exposing you to the tools and methods used in reputable ethical hacking activities, CEH trains people realistically. To obtain hands-on experience with the frequently used tools, we strongly advise checking out\u00a0<a href=\"https:\/\/www.microteklearning.com\/ceh-certified-ethical-hacker-training\/\" target=\"_blank\" rel=\"noreferrer noopener\">CEH certification<\/a>\u00a0and CEH v13 mock examinations online before taking the CEH v13 exam. Check out our online Ethical Hacking certification for more information.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cheat_sheet_for_Certified_Ethical_Hacking\"><\/span>Cheat sheet for Certified Ethical Hacking<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>This cheat sheet&#8217;s information, while not exhaustive, aims to cover all exam topics and includes hints to keep the information useful. Feel free to add new information and mnemonics to the cheat sheet in order to tailor it to your preferences.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Basics\"><\/span>1. Basics<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"a_Essential_Terms\"><\/span>a. Essential Terms<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hack Value: An object&#8217;s value as measured by a hacker&#8217;s interest in it.<\/li>\n\n\n\n<li>A system&#8217;s vulnerability is a weakness that can be used against it.<\/li>\n\n\n\n<li>exploit: Making use of the vulnerability that has been found.<\/li>\n\n\n\n<li>The payload of a hack is the malicious software or exploit code that is sent to the target.<\/li>\n\n\n\n<li>Exploiting recently discovered, unpatched vulnerabilities is known as a zero-day attack.<\/li>\n\n\n\n<li>A specific method used by hackers to access one system and then use it to access other systems connected to the same network is known as &#8220;daisy-chaining.&#8221;<\/li>\n\n\n\n<li>Doxing: The malicious tracking of a person&#8217;s personally identifying information (PII).<\/li>\n\n\n\n<li>Bot: A piece of software that performs automated tasks.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"b_Information_security_components\"><\/span>b. Information security components<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensuring confidentiality means limiting access to information to those who are authorized.<\/li>\n\n\n\n<li>Integrity: Assures the truthfulness of the data.<\/li>\n\n\n\n<li>Availability: Ensuring that resources are available when needed by authorized users.<\/li>\n\n\n\n<li>Authenticity: Assures that something is pure and unadulterated.<\/li>\n\n\n\n<li>Non-repudiation: Ensures that senders and recipients, respectively, report delivery and reception.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"c_Penetration_Testing_Phases\"><\/span>c. Penetration Testing Phases<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>1. Reconnaissance<\/p>\n\n\n\n<p>2. Scanning &amp; Enumeration<\/p>\n\n\n\n<p>3. Gaining Access<\/p>\n\n\n\n<p>4. Maintaining Access<\/p>\n\n\n\n<p>5. Covering Tracks<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"d_Types_of_Threats\"><\/span>d. Types of Threats<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Network threats: An attacker could enter a channel and take the data being exchanged on the network.<\/li>\n\n\n\n<li>hosts are at risk since it gathers data from a system.<\/li>\n\n\n\n<li>Application-specific dangers include the exploitation of unsecured gateways.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"e_Types_of_Attacks\"><\/span>e. Types of Attacks<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Attacks the victim&#8217;s main operating system.<\/li>\n\n\n\n<li>Attacks originate from applications, typically as a result of developers skipping security testing.<\/li>\n\n\n\n<li>Shrink Wrap: Taking use of the application&#8217;s unpatched frameworks and libraries.<\/li>\n\n\n\n<li>Misconfiguration: Hacks committed on systems with inadequate security configuration.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Legal\"><\/span>2. Legal<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>18 U.S.C 1029 &amp; 1030<\/li>\n\n\n\n<li>RFC 1918 &#8211; Private IP Standard<\/li>\n\n\n\n<li>RFC 3227 \u2013 Data collection and storage<\/li>\n\n\n\n<li>ISO 27002 &#8211; InfoSec Guidelines<\/li>\n\n\n\n<li>CAN-SPAM &#8211; Email marketing<\/li>\n\n\n\n<li>SPY-Act &#8211; License Enforcement<\/li>\n\n\n\n<li>DMCA &#8211; Intellectual Property<\/li>\n\n\n\n<li>SOX &#8211; Corporate Finance Processes<\/li>\n\n\n\n<li>GLBA &#8211; Personal Finance Data<\/li>\n\n\n\n<li>FERPA &#8211; Education Records<\/li>\n\n\n\n<li>FISMA &#8211; Gov Networks Security Std <\/li>\n\n\n\n<li>CVSS &#8211; Common Vulnerability Scoring System<\/li>\n\n\n\n<li>CVE &#8211; Common Vulnerabilities and Exposure<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Reconnaissance\"><\/span>3. Reconnaissance<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The term &#8220;footprinting,&#8221; which also refers to the preliminary study or surveying the target, is used.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"a_Information_on_footprints\"><\/span>a. Information on footprints<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Domains, subdomains, IP addresses, DNS, and Whois information, as well as VPN firewalls, utilizing, for example, like-scan, are only a few of the network&#8217;s informational components.<\/li>\n\n\n\n<li>System details include the web server&#8217;s operating system, server locations, users, usernames, passwords, and passcodes.<\/li>\n\n\n\n<li>Information about the organization, including its history, phone numbers, and locations.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"b_Tools_for_measuring_footprints\"><\/span>b. Tools for measuring footprints<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Maltego, FOCA, Recon-ng (The Recon-ng Framework), Recon-dog, and Dmitry (DeepMagic Information Gathering Tool).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"c_Google_Hacking\"><\/span>c. Google Hacking<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Google Hacking exploits sophisticated Google search engine operators known as &#8220;dorks&#8221; to find weaknesses by spotting particular text problems in search results.<\/p>\n\n\n\n<p>Typical nerds:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>site: Only pages with the requested query in their URLs inurl: Only pages from the given domain<\/li>\n\n\n\n<li>only pages with the query in their titles are listed in the title.<\/li>\n\n\n\n<li>cache: Archived copies of the requested page<\/li>\n\n\n\n<li>link: Only webpages with the requested URL. Discontinued.<\/li>\n\n\n\n<li>only outcomes for the specified filetype<\/li>\n<\/ul>\n\n\n\n<p>Google hacking instruments:<\/p>\n\n\n\n<p>Google&#8217;s database hack, honeypot hack, and metagoofil.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Network_scanning\"><\/span>4. Network scanning<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Involves gathering further details about the victims&#8217; network&#8217;s hosts, ports, and services. Its purpose is to locate weak points before developing an offensive strategy.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"a_Sorting_by_kind\"><\/span>a. Sorting by kind<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Checking open ports and services is known as port scanning.<\/li>\n\n\n\n<li>IP addresses found during network scanning.<\/li>\n\n\n\n<li>Testing for known flaws is called vulnerability scanning.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"b_Usual_ports_for_scanning\"><\/span>b. Usual ports for scanning<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>22&nbsp;<\/td><td>TCP&nbsp;<\/td><td>SSH (Secure Shell) &nbsp;(Secure&nbsp;<\/td><\/tr><tr><td>23&nbsp;<\/td><td>TCP&nbsp;<\/td><td>Telnet &nbsp; &nbsp;&nbsp;<\/td><\/tr><tr><td>25&nbsp;<\/td><td>TCP&nbsp;<\/td><td>SMTP (Simple Mail (Simple&nbsp;<\/td><\/tr><tr><td>53&nbsp;<\/td><td>TCP\/UDP&nbsp;<\/td><td>DNS (Domain Name (Domain&nbsp;<\/td><\/tr><tr><td>80&nbsp;<\/td><td>TCP&nbsp;<\/td><td>HTTP (Hypertext Transfer (Hypertext&nbsp;<\/td><\/tr><tr><td>123&nbsp;<\/td><td>TCP&nbsp;<\/td><td>NTP (Network Time (Network&nbsp;<\/td><\/tr><tr><td>443&nbsp;<\/td><td>TCP\/UDP&nbsp;<\/td><td>HTTPS &nbsp; &nbsp;&nbsp;<\/td><\/tr><tr><td>500&nbsp;<\/td><td>TCP\/UDP&nbsp;<\/td><td>IKE\/IPSec (Internet Key (Internet&nbsp;<\/td><\/tr><tr><td>631&nbsp;<\/td><td>TCP\/UDP&nbsp;<\/td><td>IPP (Internet Printing (Internet&nbsp;<\/td><\/tr><tr><td>3389&nbsp;<\/td><td>TCP\/UDP&nbsp;<\/td><td>RDP (Remote Desktop (Remote&nbsp;<\/td><\/tr><tr><td>9100&nbsp;<\/td><td>TCP\/UDP<\/td><td>AppSocket\/JetDirect (HP JetDirect, (HP&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"c_Scanning_Equipment\"><\/span>c. Scanning Equipment<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Nmap: Sends specially constructed packets to scan the network. Typical Nmap choices include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>sA: ACK scan<\/li>\n\n\n\n<li>sF: FIN scan<\/li>\n\n\n\n<li>sS: SYN<\/li>\n\n\n\n<li>sT: TCP scan<\/li>\n\n\n\n<li>sI: IDLS scan<\/li>\n\n\n\n<li>sn: PING sweep<\/li>\n\n\n\n<li>sN: NULL<\/li>\n\n\n\n<li>sS: Stealth Scan<\/li>\n\n\n\n<li>sR: RPC scan<\/li>\n\n\n\n<li>Po: No ping<\/li>\n\n\n\n<li>sW: Window<\/li>\n\n\n\n<li>sX: XMAS tree scan<\/li>\n\n\n\n<li>PI: ICMP ping<\/li>\n\n\n\n<li>PS: SYN ping<\/li>\n\n\n\n<li>PT: TCP ping<\/li>\n\n\n\n<li>oN: Normal output<\/li>\n\n\n\n<li>oX: XML output<\/li>\n\n\n\n<li>A OS\/Vers\/Script -T&lt;0-4&gt;: Slow \u2013 Fast<\/li>\n<\/ul>\n\n\n\n<p>scanning ports with ping. open source Nmap can port scan a variety of IP addresses, however, Hping can only port scan one specific IP address, making Hping lower level and stealthier than Nmap.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"d_Methods_consist_of\"><\/span>d. Methods consist of<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ICMP ping sweep and broadcast are two types of ping scanning.<\/li>\n\n\n\n<li>TCP connection, SYN scan, RFC 793 scans, ACK scan, and IDLE scan are all examples of TCP scanning.<\/li>\n\n\n\n<li>When a port is inaccessible, scanning UDP takes advantage of the recipient&#8217;s UDP behavior by delivering an ICMP packet with an error code.<\/li>\n\n\n\n<li>Reverse DNS resolution is used in list scanning to determine the names of the hosts.<\/li>\n\n\n\n<li>Finding UPnP vulnerabilities after buffer overflow or DoS attacks using SSDP scanning.<\/li>\n\n\n\n<li>An Ethernet LAN can be scanned using the ARP Scan tool.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Enumeration\"><\/span>5. Enumeration<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Using a system and asking it to provide the necessary data. involves finding flaws and exploiting them.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"a_Methods_of_counting\"><\/span>a. Methods of counting:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Windows list-building<\/li>\n\n\n\n<li>Enumerating Windows user accounts<\/li>\n\n\n\n<li>Enumeration of NetBIOS<\/li>\n\n\n\n<li>Enumeration of SNMP<\/li>\n\n\n\n<li>Enumeration of LDAP<\/li>\n\n\n\n<li>Enumeration of NTP<\/li>\n\n\n\n<li>Enumeration of SMTP<\/li>\n\n\n\n<li>crudely imposing Dynamic Directory<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"b_DNS_enumeration\"><\/span>b. DNS enumeration:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>&#8220;Domain Name System&#8221; is what DNS stands for. To translate a URL to an IP address, a DNS record is a database entry. Popular DNS records are:<\/p>\n\n\n\n<p>DNS enumeration tools include dig, host, nslookup, and dnsrecon.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"c_DHCP\"><\/span>c. DHCP:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Client \u2014Discovers&#8211;&gt; Server<\/li>\n\n\n\n<li>Client \u00dfOffers \u00e0 Server<\/li>\n\n\n\n<li>Client \u2026. Request \u2026&gt; Server<\/li>\n\n\n\n<li>Client &lt;\u2026Ack\u2026&gt; Server<\/li>\n\n\n\n<li>IP is removed from the pool<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Sniffing\"><\/span>6. Sniffing<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Involves employing a particular application or equipment to gather data packets on a network.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"a_Sniffing_types\"><\/span>a. Sniffing types<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>There is no need to send any packets when passively sniffing.<\/li>\n\n\n\n<li>Active sniffing: Demand that a packet has a source and destination address.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"b_Sniffer\"><\/span>b. Sniffer<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Programs for &#8220;packet sniffing&#8221; are made to capture packets including data like traffic, router configuration, and passwords.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"c_Wiretapping\"><\/span>c. Wiretapping<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Refers to the surveillance of phone and Internet communications by a third party.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"d_Sniffing_Tools\"><\/span>d. Sniffing Tools<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cain and Abel<\/li>\n\n\n\n<li>Libpcap<\/li>\n\n\n\n<li>TCPflow<\/li>\n\n\n\n<li>Tcpdump<\/li>\n\n\n\n<li>Wireshark<\/li>\n\n\n\n<li>Kismet<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"e_Sniffing_Attacks\"><\/span>e. Sniffing Attacks<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Send as many fake MAC addresses to the switch as possible until the CAM table is full. As a result, the switch switches into fail-open mode and broadcasts the incoming traffic to all network ports. After then, the attacker can begin sniffing the network traffic.<\/li>\n\n\n\n<li>DHCP attacks: A kind of Denial-of-Service attack that uses up every address the server has to provide.<\/li>\n\n\n\n<li>DNS poisoning: Using a malicious IP address to replace a reliable one in order to alter the DNS table.<\/li>\n\n\n\n<li>VLAN hopping is the process of attacking a host on one VLAN to get access to traffic on another VLAN.<\/li>\n\n\n\n<li>Attacks using OSPF: Establishes a trustworthy connection with the neighboring router.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Attacking_a_System\"><\/span>7. Attacking a System<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"a_LM_Hashing\"><\/span>a. LM Hashing<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>7 spaces hashed: AAD3B435B51404EE<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"b_Attack_types\"><\/span>b. Attack types<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Learning about system flaws passively online without consuming system resources<\/li>\n\n\n\n<li>Online activity: guessing passwords<\/li>\n\n\n\n<li>Offline: Password theft, typically done through the SAM file.<\/li>\n\n\n\n<li>Non-electronic: Sidejacking<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"c_Sidejacking\"><\/span>c. Sidejacking<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Gaining unauthorized access to a website, frequently through cookie hijacking.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"d_Types_of_Authentication\"><\/span>d. Types of Authentication<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Type 1: When you are informed<\/li>\n\n\n\n<li>Type 2: When anything is available.<\/li>\n\n\n\n<li>Type 3: When something is you<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"e_Session_Hijacking\"><\/span>e. Session Hijacking<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Known session hijacking includes:<\/p>\n\n\n\n<p>1. Targeting and eavesdropping on client-server traffic<\/p>\n\n\n\n<p>2. Monitoring and predicting the sequence of traffic<\/p>\n\n\n\n<p>3. Desynchronize the client session.<\/p>\n\n\n\n<p>4. By anticipating the session token, you can control the session.<\/p>\n\n\n\n<p>5. Send data packets to the target server.<\/p>\n\n\n\n<p>Check out our top cybersecurity courses whenever you feel you are falling behind in the foundations of cybersecurity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"8_Social_engineering\"><\/span>8. Social engineering<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Social engineering is the practice of persuading members of the target organization to divulge sensitive and private information.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"a_Social_engineering_techniques\"><\/span>a. Social engineering techniques<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>1. Research: Obtain sufficient knowledge about the intended business<\/p>\n\n\n\n<p>2. Choose a target: Select a targeted worker<\/p>\n\n\n\n<p>3. Relationship: Establishing a relationship with the target employee can help you win their trust.<\/p>\n\n\n\n<p>4. Exploit: Find out what the target employee knows.<\/p>\n\n\n\n<p>5. Identity fraud<\/p>\n\n\n\n<p>Obtaining personally identifiable data from a worker and using it to pass for that individual.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"b_Social_engineers_various_forms\"><\/span>b. Social engineers&#8217; various forms<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Insider Associates: Authorized access is restricted<\/li>\n\n\n\n<li>Affiliate Insiders: Insiders have identity-faking capabilities.<\/li>\n\n\n\n<li>Affiliates from the Outside: An outsider who uses a weak access point.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"9_Physical_Protection\"><\/span>9. Physical Protection<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Physical measures, such as humidity-control systems, power issues, and air quality<\/li>\n\n\n\n<li>Technical measures, such as biometrics and smart cards<\/li>\n\n\n\n<li>Operational measures include things like security protocols and rules.<\/li>\n\n\n\n<li>Access management<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>False rejection rate (FRR): When a biometric disqualifies a legitimate person<\/li>\n\n\n\n<li>False acceptance rate (FAR) measures how frequently a biometric accepts an incorrect user.<\/li>\n\n\n\n<li>(CER) Crossover error rate How well a system performs is determined by combining the FRR and FAR.<\/li>\n\n\n\n<li>Environmental catastrophes example: floods, tornadoes, and hurricanes.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"10_Online_hacking\"><\/span>10. Online hacking<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"a_Hacking_of_web_servers\"><\/span>a. Hacking of web servers.<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>A web server is a device used to store, process, and distribute websites. Hacking a web server involves:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Obtaining robots.txt allows you to see directories and files that are hidden from web crawlers, which is a step in the hacking of a web server.<\/li>\n\n\n\n<li>Footprinting: List popular web applications http-enum -p80 nmap \u2014script<\/li>\n\n\n\n<li>Mirroring.<\/li>\n\n\n\n<li>Discover weak points.<\/li>\n\n\n\n<li>Attempt password cracking and session hijacking.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"b_Tools_for_hacking_web_servers\"><\/span>b. Tools for hacking web servers<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>HULK DoS, w3af, Wfetch, THC Hydra, and Metasploit<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"c_Hacking_into_web_applications\"><\/span>c. Hacking into web applications<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>The user interfaces for interacting with web servers is a web application. Hacking techniques for web applications include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Web server assault using web infrastructure footprinting.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"d_Injection_of_SQL\"><\/span>d. Injection of SQL<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Harmful SQL queries being injected into the program. allows an attacker to log in without using their credentials and get unauthorized access to the system. The steps consist of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Information gathering, for example, the name, version, and kind of the database.<\/li>\n\n\n\n<li>Attacks using SQL injection to retrieve data from databases, including names, column names, and records.<\/li>\n\n\n\n<li>sophisticated SQL injection: To compromise the network and underlying operating system.<\/li>\n<\/ul>\n\n\n\n<p><strong>Tools:<\/strong><\/p>\n\n\n\n<p>SQL Power Injector, The Mole, jSQL Injection, sqlmap, and the OWASP SQLiX tool.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"11_Cryptography\"><\/span>11. Cryptography<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The act of concealing sensitive information is known as cryptography.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"a_terms\"><\/span>a. terms<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>An encryption and decryption algorithm is referred to as a cipher.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unencrypted data in clear text or plaintext<\/li>\n\n\n\n<li>Cipher text is coded information.<\/li>\n<\/ul>\n\n\n\n<p>encryption techniques<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Block cipher, 64-bit block size, 56-bit key, Data Encryption Standard<\/li>\n\n\n\n<li>Block cipher, 168-bit key, 3DES (Triple Data Encryption Standard).<\/li>\n\n\n\n<li>An iterated block cipher, AES.<\/li>\n\n\n\n<li>Symmetric-key algorithm for the Rivset Cipher.<\/li>\n\n\n\n<li>Blowfish is a fast symmetric block cipher with a 64-bit block size and a 32 to 448-bit key.<\/li>\n\n\n\n<li>Symmetric-key block cipher Twofish<\/li>\n\n\n\n<li>RSA (Rivest-Shamir-Adleman): Using two huge prime numbers to create robust encryption.<\/li>\n\n\n\n<li>For creating a shared key between two entities via an insecure channel, use Diffie-Hellman.<\/li>\n\n\n\n<li>Digital Signature Algorithm: The message&#8217;s signer is identified by their private key. The public key is used to validate the digital signature.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"12_Cloud_security\"><\/span>12. Cloud security<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Cloud providers implement access restrictions with logs, the ability to demand a valid access justification to prevent repudiation, and limited access.<\/p>\n\n\n\n<p>Attacks on cloud computing<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Wrapping attack: Modifies the distinctive sign while preserving the reliability of the signature.<\/li>\n\n\n\n<li>The attacker controls a VM on the same physical host in side channel assaults (by compromising one or placing own)<\/li>\n\n\n\n<li>Attack using the Cloud Hopper protocol aims to gain access to private information by infiltrating employees&#8217; or cloud service providers&#8217; accounts.<\/li>\n\n\n\n<li>Attack conducted through the use of a specific BMC vulnerability<\/li>\n\n\n\n<li>Man-In-The-Cloud (MITC) attack: Conducted by utilizing the infrastructure of file synchronization services (such as Google Drive and Dropbox).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"13_Malware_and_other_assaults\"><\/span>13. Malware and other assaults<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A destructive program known as malware is made to harm computers and grant access to their authors. mainly consist of<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"a_Trojans\"><\/span>a. Trojans<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Malware is hidden within ostensibly safe apps. Types consist of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Malware that incorporates a back door enabling administrative access to the target machine is known as remote access trojans (RATs).<\/li>\n\n\n\n<li>Trojans open a backdoor on the target machine, giving attackers uninterrupted access.<\/li>\n\n\n\n<li>Boot programs are installed on the target system by botnet Trojans.<\/li>\n\n\n\n<li>Trojans known as rootkits allow users to access restricted parts of the software.<\/li>\n\n\n\n<li>Trojans for electronic banking: intercept and transfer to attacker account information before encryption.<\/li>\n\n\n\n<li>Trojans that employ a proxy server let an attacker connect to the Internet by using the victim&#8217;s computer as a proxy.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"b_Viruses\"><\/span>b. Viruses<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Stealth virus: A virus actively works to hide infection from antivirus software<\/li>\n\n\n\n<li>Not self-replicating, population growth is zero, and the Logic Bomb virus may be parasitic.<\/li>\n\n\n\n<li>A virus that is polymorphic will alter its payload to evade signature detection.<\/li>\n\n\n\n<li>Viruses with metamorphic properties can change their own code or structure.<\/li>\n\n\n\n<li>MS Office product macro generation is a macro virus.<\/li>\n\n\n\n<li>viruses that contaminate executable files<\/li>\n\n\n\n<li>Malicious code is executed when the system boots up.<\/li>\n\n\n\n<li>Combines boot record infectors and file infectors to form multipartite viruses.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Although a significant number of applicants did find the CEH v13\u00a0exam to be a little challenging, it is absolutely possible to pass the exam with a good grade if you have sufficient preparation. The four hours allotted are sufficient to finish the test.<\/p>\n\n\n\n<p>Avoid panicking and be assured in your planning. To make sure you&#8217;ve studied everything, you may always review our ethical hacking cheat sheet and take CEH v13\u00a0practice exams before the exam.<\/p>\n\n\n\n<p>We strongly advise you to enroll in the&nbsp;<a href=\"https:\/\/www.microteklearning.com\/ceh-certified-ethical-hacker-training\/\" target=\"_blank\" rel=\"noreferrer noopener\">CEH certification<\/a>&nbsp;offered by Microtek Learning if you&#8217;re interested in learning more about CEH.<\/p>\n\n\n\n<p>Good luck with the exam!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions_FAQs\"><\/span>Frequently Asked Questions (FAQs)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>Does CEH offer instruction in hacking?<\/strong><\/p>\n\n\n\n<p>The CEH certification teaches people white hat or ethical hacking through penetration testing. This includes educating people on how to think like malicious hackers, searching for flaws in target systems, and employing malicious tools\u2014but in a legal and acceptable way\u2014to evaluate a system&#8217;s security.<\/p>\n\n\n\n<p><strong>Which is superior, PenTest+ or CEH?<\/strong><\/p>\n\n\n\n<p>Although you can&#8217;t go wrong with either, EC-Council has a better reputation and is seen as more reliable by companies than PenTest+. While CEH primarily uses techniques used by hostile hackers, PenTest+ covers aspects of vulnerability management, making it more useful for assessing cybersecurity. For more information, see our Ethical Hacking certification offered by Microtek Learning.<\/p>\n\n\n\n<p><strong>What does a hacker cheat sheet entail?<\/strong><\/p>\n\n\n\n<p>A cheat sheet provides additional information to help in memorization. It contains a condensed version of each concept, technique, or tool you&#8217;ll encounter on the CEH v13 exam, gathered in one place.<\/p>\n\n\n\n<p><strong>Where can I find free CEH v13 exam dump questions?<\/strong><\/p>\n\n\n\n<p>Online sources abound where you may find the most recent CEH v13 exam dumps that include CEH v13 questions and answers. Check out this for a quick start.<\/p>\n\n\n\n<p><strong>What requirements must be met for CEH?<\/strong><\/p>\n\n\n\n<p>To take training classes and sit for the CEH exam, you must meet a few conditions. These include having to be at least 18 years old and having either equal training or experience working in an infosec environment. Coding knowledge is advantageous but not required.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The most popular ethical hacking certification in the world and the one that cybersecurity experts choose is still CEH Certification from the EC Council. <\/p>\n","protected":false},"author":1,"featured_media":811,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55],"tags":[],"class_list":["post-810","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ec-council"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CEH Certification Exam Cheat Sheet (2026)<\/title>\n<meta name=\"description\" content=\"We strongly advise you to enroll in Ethical Hacking certification offered by Microtek Learning if you&#039;re interested in learning more about CEH\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CEH Certification Exam Cheat Sheet (2026)\" \/>\n<meta property=\"og:description\" content=\"We strongly advise you to enroll in Ethical Hacking certification offered by Microtek Learning if you&#039;re interested in learning more about CEH\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/\" \/>\n<meta property=\"og:site_name\" content=\"IT Training Blog \u2013 Certifications, Cloud &amp; Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-16T22:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-28T22:56:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-exam-cheat-sheet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"580\" \/>\n\t<meta property=\"og:image:height\" content=\"565\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microtek Learning\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microtek Learning\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/\"},\"author\":{\"name\":\"Microtek Learning\",\"@id\":\"https:\/\/www.microteklearning.com\/blog\/#\/schema\/person\/bbe6552c3446438e1417c5ada9c3664a\"},\"headline\":\"CEH Certification Exam Cheat Sheet\",\"datePublished\":\"2023-01-16T22:30:00+00:00\",\"dateModified\":\"2026-03-28T22:56:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/\"},\"wordCount\":3242,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microteklearning.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-exam-cheat-sheet.png\",\"articleSection\":[\"EC-Council\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/\",\"url\":\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/\",\"name\":\"CEH Certification Exam Cheat Sheet (2026)\",\"isPartOf\":{\"@id\":\"https:\/\/www.microteklearning.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-exam-cheat-sheet.png\",\"datePublished\":\"2023-01-16T22:30:00+00:00\",\"dateModified\":\"2026-03-28T22:56:12+00:00\",\"description\":\"We strongly advise you to enroll in Ethical Hacking certification offered by Microtek Learning if you're interested in learning more about CEH\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#primaryimage\",\"url\":\"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-exam-cheat-sheet.png\",\"contentUrl\":\"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-exam-cheat-sheet.png\",\"width\":580,\"height\":565,\"caption\":\"CEH\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microteklearning.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CEH Certification Exam Cheat Sheet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microteklearning.com\/blog\/#website\",\"url\":\"https:\/\/www.microteklearning.com\/blog\/\",\"name\":\"IT Training Blog \u2013 Certifications, Cloud &amp; Cybersecurity\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microteklearning.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microteklearning.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microteklearning.com\/blog\/#organization\",\"name\":\"IT Training Blog \u2013 Certifications, Cloud &amp; Cybersecurity\",\"url\":\"https:\/\/www.microteklearning.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microteklearning.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2026\/02\/PNG.png\",\"contentUrl\":\"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2026\/02\/PNG.png\",\"width\":150,\"height\":40,\"caption\":\"IT Training Blog \u2013 Certifications, Cloud &amp; Cybersecurity\"},\"image\":{\"@id\":\"https:\/\/www.microteklearning.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microteklearning.com\/blog\/#\/schema\/person\/bbe6552c3446438e1417c5ada9c3664a\",\"name\":\"Microtek Learning\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microteklearning.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b3b961db8f2a613263205e36e8b4dfde727d161bdfb64c5dbf51a2f4832239ec?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b3b961db8f2a613263205e36e8b4dfde727d161bdfb64c5dbf51a2f4832239ec?s=96&d=mm&r=g\",\"caption\":\"Microtek Learning\"},\"sameAs\":[\"http:\/\/ncrpackersmovers.in\/blogs\"],\"url\":\"https:\/\/www.microteklearning.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CEH Certification Exam Cheat Sheet (2026)","description":"We strongly advise you to enroll in Ethical Hacking certification offered by Microtek Learning if you're interested in learning more about CEH","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/","og_locale":"en_US","og_type":"article","og_title":"CEH Certification Exam Cheat Sheet (2026)","og_description":"We strongly advise you to enroll in Ethical Hacking certification offered by Microtek Learning if you're interested in learning more about CEH","og_url":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/","og_site_name":"IT Training Blog \u2013 Certifications, Cloud &amp; Cybersecurity","article_published_time":"2023-01-16T22:30:00+00:00","article_modified_time":"2026-03-28T22:56:12+00:00","og_image":[{"width":580,"height":565,"url":"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-exam-cheat-sheet.png","type":"image\/png"}],"author":"Microtek Learning","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microtek Learning","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#article","isPartOf":{"@id":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/"},"author":{"name":"Microtek Learning","@id":"https:\/\/www.microteklearning.com\/blog\/#\/schema\/person\/bbe6552c3446438e1417c5ada9c3664a"},"headline":"CEH Certification Exam Cheat Sheet","datePublished":"2023-01-16T22:30:00+00:00","dateModified":"2026-03-28T22:56:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/"},"wordCount":3242,"commentCount":0,"publisher":{"@id":"https:\/\/www.microteklearning.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-exam-cheat-sheet.png","articleSection":["EC-Council"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/","url":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/","name":"CEH Certification Exam Cheat Sheet (2026)","isPartOf":{"@id":"https:\/\/www.microteklearning.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#primaryimage"},"image":{"@id":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-exam-cheat-sheet.png","datePublished":"2023-01-16T22:30:00+00:00","dateModified":"2026-03-28T22:56:12+00:00","description":"We strongly advise you to enroll in Ethical Hacking certification offered by Microtek Learning if you're interested in learning more about CEH","breadcrumb":{"@id":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#primaryimage","url":"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-exam-cheat-sheet.png","contentUrl":"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2023\/11\/ceh-certification-exam-cheat-sheet.png","width":580,"height":565,"caption":"CEH"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microteklearning.com\/blog\/ceh-certification-exam-cheat-sheet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microteklearning.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CEH Certification Exam Cheat Sheet"}]},{"@type":"WebSite","@id":"https:\/\/www.microteklearning.com\/blog\/#website","url":"https:\/\/www.microteklearning.com\/blog\/","name":"IT Training Blog \u2013 Certifications, Cloud &amp; Cybersecurity","description":"","publisher":{"@id":"https:\/\/www.microteklearning.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microteklearning.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microteklearning.com\/blog\/#organization","name":"IT Training Blog \u2013 Certifications, Cloud &amp; Cybersecurity","url":"https:\/\/www.microteklearning.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microteklearning.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2026\/02\/PNG.png","contentUrl":"https:\/\/www.microteklearning.com\/blog\/wp-content\/uploads\/2026\/02\/PNG.png","width":150,"height":40,"caption":"IT Training Blog \u2013 Certifications, Cloud &amp; Cybersecurity"},"image":{"@id":"https:\/\/www.microteklearning.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microteklearning.com\/blog\/#\/schema\/person\/bbe6552c3446438e1417c5ada9c3664a","name":"Microtek Learning","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microteklearning.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b3b961db8f2a613263205e36e8b4dfde727d161bdfb64c5dbf51a2f4832239ec?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b3b961db8f2a613263205e36e8b4dfde727d161bdfb64c5dbf51a2f4832239ec?s=96&d=mm&r=g","caption":"Microtek Learning"},"sameAs":["http:\/\/ncrpackersmovers.in\/blogs"],"url":"https:\/\/www.microteklearning.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.microteklearning.com\/blog\/wp-json\/wp\/v2\/posts\/810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microteklearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microteklearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microteklearning.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microteklearning.com\/blog\/wp-json\/wp\/v2\/comments?post=810"}],"version-history":[{"count":3,"href":"https:\/\/www.microteklearning.com\/blog\/wp-json\/wp\/v2\/posts\/810\/revisions"}],"predecessor-version":[{"id":2643,"href":"https:\/\/www.microteklearning.com\/blog\/wp-json\/wp\/v2\/posts\/810\/revisions\/2643"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microteklearning.com\/blog\/wp-json\/wp\/v2\/media\/811"}],"wp:attachment":[{"href":"https:\/\/www.microteklearning.com\/blog\/wp-json\/wp\/v2\/media?parent=810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microteklearning.com\/blog\/wp-json\/wp\/v2\/categories?post=810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microteklearning.com\/blog\/wp-json\/wp\/v2\/tags?post=810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}