Professional Documents
Culture Documents
Version Comparison: Cehv8 Vs Cehv7
Version Comparison: Cehv8 Vs Cehv7
Version Comparison: Cehv8 Vs Cehv7
Version Comparison
Version Comparison
CEHv8 vs CEHv7
CEHv7 CEHv8
Updated information as per the latest
developments with a proper flow
Classroom friendly with diagrammatic
representation of concepts and attacks
Exclusive section for best practices to
follow to protect information systems
against various attacks
New and rich presentation style with eye
catching graphics
Latest OS covered and a patched testing
environment
Well tested, result oriented, descriptive
and analytical lab manual to evaluate the
presented concepts
19 Modules 20 Modules
90 Labs 110 Labs
1700 Slides 1770 Slides
No Document Document
CEHv7 Module 01: Introduction to Ethical CEHv8 Module 01: Introduction to Ethical
Hacking Hacking
Hacking Phases
Vulnerability Research
CEHv7 Module 02: Footprinting and CEHv8 Module 02: Footprinting and
Reconnaissance Reconnaissance
Footprinting Countermeasures
Footprinting Terminologies
What Is Footprinting?
Scanning Networks
Network scanning refers to a set of procedures for identifying hosts, ports, and services in a
network. The topics highlighted in red under CEHv8 Module 03: Scanning Networks are the
new additions
CEHv7 Module 03: Scanning Networks CEHv8 Module 03: Scanning Networks
Enumeration
In the enumeration phase, attacker creates active connections to system and performs directed
queries to gain more information about the target. The topics highlighted in red under CEHv8
Module 04: Enumeration are the new additions.
System Hacking
Password cracking techniques are used to recover passwords from computer systems. The
topics highlighted in red under CEHv8 Module 05 System Hacking are the new additions.
CEHv7 Module 06: Trojans and Backdoors CEHv8 Module 06: Trojans and Backdoors
CEHv7 Module 07: Viruses and Worms CEHv8 Module 07: Viruses and Worms
Sniffers
Packet sniffing is a process of monitoring and capturing all data packets passing through a given
network using software (application) or hardware device. The topics highlighted in red under
CEHv8 Module 08: Sniffing are the new additions.
Social Engineering
Social engineering is the art of convincing people to reveal confidential information. Social
engineers depend on the fact that people are unaware of their valuable information and are
careless about protecting it. The topics highlighted in red under CEHv8 Module 09: Social
Engineering are the new additions.
CEHv7 Module 09: Social Engineering CEHv8 Module 09: Social Engineering
Denial of Service
Denial of Service (DoS) is an attack on a computer or network that prevents legitimate use of its
resources. The topics highlighted in red under CEHv8 Module 10: Denial-of-Service are the new
additions.
Session Hijacking
Session Hijacking refers to the exploitation of a valid computer session where an attacker takes
over a session between two computers. The topics highlighted in red under CEHv8 Module 11:
Session Hijacking are the new additions.
CEHv7 Module 11: Session Hijacking CEHv8 Module 11: Session Hijacking
Hacking Webservers
Web server pen testing is used to identify, analyze, and report vulnerabilities such as
authentication weaknesses, configuration errors, protocol related vulnerabilities, etc. in a web
server. The topics highlighted in red under CEHv8 Module 12: Hacking Webservers are the new
additions.
CEHv7 Module 11: Session Hijacking CEHv8 Module 11: Session Hijacking
CEHv7 Module 13: Hacking Web CEHv8 Module 13: Hacking Web
Applications Applications
How Web Applications Work How Web Applications Work
Web Attack Vectors Web Attack Vectors
Web Application Threats Web Application Threats
Web App Hacking Methodology Web App Hacking Methodology
Footprint Web Infrastructure Footprint Web Infrastructure
Hacking Web Servers Hacking Web Servers
Analyze Web Applications Analyze Web Applications
Attack Authentication Mechanism Attack Authentication Mechanism
Attack Authorization Schemes Attack Authorization Schemes
Session Management Attack Session Management Attack
Attack Data Connectivity Attack Data Connectivity
Attack Web App Client Attack Web App Client
Attack Web Services Attack Web Services
Web Application Hacking Tools Latest Web Application Hacking Tools
Countermeasures Countermeasures
Web Application Security Tools Latest Web Application Security Tools Added
Web Application Firewall Web Application Firewall
Web Application Pen Testing Web Application Pen Testing
SQL Injection
SQL Injection is the most common website vulnerability on the Internet. It is a flaw in Web
Applications and not a database or web server issue. The topics highlighted in red under CEHv8
Module 14: SQL Injection are the new additions.
CEHv7 Module 14: SQL Injection CEHv8 Module 14: SQL Injection
SQL Injection SQL Injection
SQL Injection Attacks SQL Injection Attacks
SQL Injection Detection SQL Injection Detection
SQL Injection Attack Characters SQL Injection Attack Characters
Testing for SQL Injection Testing for SQL Injection
Types of SQL Injection Types of SQL Injection
Blind SQL Injection Blind SQL Injection
SQL Injection Methodology SQL Injection Methodology
Advanced SQL Injection Advanced SQL Injection
Password Grabbing Bypass Website Logins Using SQL Injection
Network Reconnaissance Using SQL Injection Password Grabbing
SQL Injection Tools Network Reconnaissance Using SQL Injection
Evasion Technique Latest SQL Injection Tools Added
How to Defend Against SQL Injection Attacks Evasion Technique
SQL Injection Detection Tools How to Defend Against SQL Injection Attacks
Latest SQL Injection Detection Tools Added
2 more Labs Added
CEHv7 Module 15: Hacking Wireless CEHv8 Module 15: Hacking Wireless
Networks Networks
CEHv7 Module 16: Evading IDS, Firewalls, CEHv8 Module 17: Evading IDS, Firewalls,
and Honeypots and Honeypots
Buffer Overflow
A generic buffer overflow occurs when a program tries to store more data in a buffer than it
was intended to hold. The topics highlighted in red under CEHv8 Module 18: Buffer Overflow
are the new additions.
CEHv7 Module 17: Buffer Overflow CEHv8 Module 18: Buffer Overflow
Cryptography
Cryptography is the conversion of data into a scrambled code that is decrypted and sent across
a private or public network. The topics highlighted in red under CEHv8 Module 19:
Cryptography are the new additions.
Cryptography Cryptography
Encryption Algorithms Encryption Algorithms
Ciphers Ciphers
What Is SSH (Secure Shell)? What Is SSH (Secure Shell)?
Cryptography Tools Latest Cryptography Tools Added
Public Key Infrastructure (PKI) Public Key Infrastructure (PKI)
Certification Authorities Certification Authorities
Digital Signature Digital Signature
Disk Encryption Disk Encryption
Disk Encryption Tool Disk Encryption Tool
Cryptography Attacks Cryptography Attacks
Code Breaking Methodologies Code Breaking Methodologies
Cryptanalysis Tools Latest Cryptanalysis Tools Added
Online MD5 Decryption Tools Online MD5 Decryption Tools
2 more Labs Added
Penetration Testing
Penetration testing assesses the security model of the organization as a whole. It reveals
potential consequences of a real attacker breaking into the network. The topics highlighted in
red under CEHv8 Module 20: Penetration Testing are the new additions.
CEHv7 Module 19: Penetration Testing CEHv8 Module 20: Penetration Testing