List the CEH Methodology
CEH Hacking Sub-Methodologies
a. Gaining Access
b. Privilege Escalation
c. Maintaining Access
d. Clearing Logs
Define Gaining Access
Bypassing security controls
Gaining Access Techniques
Password cracking
Vulnerability exploitation
Social Engineering
Define Horizontal Privilege Escalation
Same privileges with different users or systems
Define Vertical Privilege Escalation
Moving from a state of lower privileges to higher privileges
Privilege Escalation Techniques
Vulnerability Exploitation
Security Misconfigurations
Maintaining Access Tools
Executing Applications/Malware Hidden files (i.e. Steganography)