CEH Exam Blueprint v5
CEH Exam Blueprint v5
CEH Exam Blueprint v5
EC-Council
CHFI
CEH Exam
ExamBlueprint
Blueprint v4.0
v3.0 11
Domain Sub Domain Description Number of Weightage
Questions (%)
CHFI Exam
CEH Exam Blueprint
Blueprint v5.0 02
02
System Hacking ▪ System Hacking Concepts 6
▪ Gaining Access
▪ Password Cracking
▪ Vulnerability Exploitation
▪ Escalating Privileges
▪ Maintaining Access
▪ Executing Applications
▪ Hiding Files
▪ Establishing Persistence
▪ Clearing Logs
Malware Threats ▪ Malware Concepts 7
▪ APT Concepts
▪ Trojan Concepts
▪ Virus and Worm Concepts
▪ Fileless Malware Concepts
▪ Malware Analysis
▪ Malware Countermeasures
▪ Anti-Malware Software
4. Network and Sniffing ▪ Sniffing Concepts 6 24%
Perimeter ▪ Sniffing Technique: MAC Attacks
Hacking ▪ Sniffing Technique: DHCP Attacks
▪ Sniffing Technique: ARP Poisoning
▪ Sniffing Technique: Spoofing Attacks
▪ Sniffing Technique: DNS Poisoning
▪ Sniffing Tools
▪ Sniffing Countermeasures
▪ Sniffing Detection Techniques
Social Engineering ▪ Social Engineering Concepts 6
▪ Social Engineering Techniques
▪ Insider Threats
▪ Impersonation on Social Networking Sites
▪ Identity Theft
▪ Social Engineering Countermeasures
Denial-of-Service ▪ DoS/DDoS Concepts 6
▪ Botnets
▪ DoS/DDoS Attack Techniques
▪ DDoS Case Study
▪ DoS/DDoS Attack Countermeasures
▪ DoS/DDoS Protection Tools
Session Hijacking ▪ Session Hijacking Concepts 6
▪ Application-Level Session Hijacking
▪ Network-Level Session Hijacking
▪ Session Hijacking Tools
▪ Session Hijacking Countermeasures
CHFI Exam
CEH Exam Blueprint
Blueprint v5.0 03
03
Evading IDS, Firewalls, ▪ IDS, IPS, Firewall, and Honeypot Concepts 6
and Honeypots ▪ IDS, IPS, Firewall, and Honeypot Solutions
▪ Evading IDS
▪ Evading Firewalls
▪ Evading NAC and Endpoint Security
▪ IDS/Firewall Evading Tools
▪ Detecting Honeypots
▪ IDS/Firewall Evasion Countermeasures
5. Web Application Hacking Web Servers ▪ Web Server Concepts 6 14%
Hacking ▪ Web Server Attacks
▪ Web Server Attack Methodology
▪ Web Server Attack Countermeasures
▪ Patch Management
Hacking Web ▪ Web App Concepts 6
Applications ▪ Web App Threats
▪ Web App Hacking Methodology
▪ Footprint Web Infrastructure
▪ Analyze Web Applications
▪ Bypass Client-Side Controls
▪ Attack Authentication Mechanism
▪ Attack Authorization Schemes
▪ Attack Access Controls
▪ Attack Session Management Mechanism
▪ Perform Injection/Input Validation Attacks
▪ Attack Application Logic Flaws
▪ Attack Shared Environments
▪ Attack Database Connectivity
▪ Attack Web App Client
▪ Attack Web Services
▪ Web API, Webhooks, and Web Shell
▪ Web App Security
SQL Injection ▪ SQL Injection Concepts 6
▪ Types of SQL Injection
▪ SQL Injection Methodology
▪ SQL Injection Tools
▪ Evasion Techniques
▪ SQL Injection Countermeasures
6. Wireless Network Hacking Wireless ▪ Wireless Concepts 6 5%
Hacking Networks ▪ Wireless Encryption
▪ Wireless Threats
▪ Wireless Hacking Methodology
▪ Wireless Hacking Tools
▪ Bluetooth Hacking
▪ Wireless Attack Countermeasures
▪ Wireless Security Tools
7. Mobile Platform, Hacking Mobile ▪ Mobile Platform Attack Vectors 6 10%
IoT, and OT Platforms ▪ Hacking Android OS
Hacking ▪ Hacking iOS
▪ Mobile Device Management
▪ Mobile Security Guidelines and Tools
CHFI Exam
CEH Exam Blueprint
Blueprint v5.0 04
04
IoT and OT Hacking ▪ IoT Concepts 6
▪ IoT Attacks
▪ IoT Hacking Methodology
▪ IoT Attack Countermeasures
▪ OT Concepts
▪ OT Attacks
▪ OT Hacking Methodology
▪ OT Attack Countermeasures
8. Cloud Computing Cloud Computing ▪ Cloud Computing Concepts 6 5%
▪ Container Technology
▪ Serverless Computing
▪ Cloud Computing Threats
▪ Cloud Hacking
▪ Cloud Security
9. Cryptography Cryptography ▪ Cryptography Concepts 6 5%
▪ Encryption Algorithms
▪ Cryptography Tools
▪ Public Key Infrastructure (PKI)
▪ Email Encryption
▪ Disk Encryption
▪ Cryptanalysis
▪ Cryptography Attack Countermeasures
CHFI Exam
CEH Exam Blueprint
Blueprint v5.0 05
05