diff --git a/1 - Essential Knowledge.md b/01 - Essential Knowledge.md similarity index 100% rename from 1 - Essential Knowledge.md rename to 01 - Essential Knowledge.md diff --git a/2 - Reconnaissance.md b/02 - Reconnaissance.md similarity index 100% rename from 2 - Reconnaissance.md rename to 02 - Reconnaissance.md diff --git a/3 - Scanning and Enumeration.md b/03 - Scanning and Enumeration.md similarity index 99% rename from 3 - Scanning and Enumeration.md rename to 03 - Scanning and Enumeration.md index a52732e..1243abe 100644 --- a/3 - Scanning and Enumeration.md +++ b/03 - Scanning and Enumeration.md @@ -333,4 +333,4 @@ - **SMTP** - VRFY - validates user - EXPN - provides actual delivery address of mailing list and aliases - - RCPT TO - defines recipients \ No newline at end of file + - RCPT TO - defines recipients diff --git a/4 - Sniffing and Evasion.md b/04 - Sniffing and Evasion.md similarity index 100% rename from 4 - Sniffing and Evasion.md rename to 04 - Sniffing and Evasion.md diff --git a/5 - Attacking a System.md b/05 - Attacking a System.md similarity index 99% rename from 5 - Attacking a System.md rename to 05 - Attacking a System.md index e572083..2516c28 100644 --- a/5 - Attacking a System.md +++ b/05 - Attacking a System.md @@ -217,4 +217,4 @@ - **Application level** - directed to replace valid application files with Trojans - **Kernel level** - attack boot sectors and kernel level replacing kernel code with back-door code; most dangerous - **Library level** - use system-level calls to hide themselves -- One way to detect rootkits is to map all the files on a system and then boot a system from a clean CD version and compare the two file systems \ No newline at end of file +- One way to detect rootkits is to map all the files on a system and then boot a system from a clean CD version and compare the two file systems diff --git a/6 - Web-Based Hacking - Servers and Applications.md b/06 - Web-Based Hacking - Servers and Applications.md similarity index 100% rename from 6 - Web-Based Hacking - Servers and Applications.md rename to 06 - Web-Based Hacking - Servers and Applications.md diff --git a/7 - Wireless Network Hacking.md b/07 - Wireless Network Hacking.md similarity index 100% rename from 7 - Wireless Network Hacking.md rename to 07 - Wireless Network Hacking.md diff --git a/8 - Mobile Communications and IoT.md b/08 - Mobile Communications and IoT.md similarity index 100% rename from 8 - Mobile Communications and IoT.md rename to 08 - Mobile Communications and IoT.md diff --git a/9 - Security in Cloud Computing.md b/09 - Security in Cloud Computing.md similarity index 100% rename from 9 - Security in Cloud Computing.md rename to 09 - Security in Cloud Computing.md diff --git a/Readme.md b/Readme.md index 95a3766..55a1a07 100644 --- a/Readme.md +++ b/Readme.md @@ -4,23 +4,23 @@ Created based off information found in [CEH Certified Ethical Hacker All-in-One ## Table of Contents -[1 - Essential Knowledge](1 - Essential Knowledge.md) +[01 - Essential Knowledge](1 - Essential Knowledge.md) -[2 - Reconnaissance](2 - Reconnaissance.md) +[02 - Reconnaissance](2 - Reconnaissance.md) -[3 - Scanning and Enumeration](3 - Scanning and Enumeration.md) +[03 - Scanning and Enumeration](3 - Scanning and Enumeration.md) -[4 - Sniffing and Evasion](4 - Sniffing and Evasion.md) +[04 - Sniffing and Evasion](4 - Sniffing and Evasion.md) -[5 - Attacking a System](5 - Attacking a System.md) +[05 - Attacking a System](5 - Attacking a System.md) -[6 - Web-Based Hacking - Servers and Applications](6 - Web-Based Hacking - Servers and Applications.md) +[06 - Web-Based Hacking - Servers and Applications](6 - Web-Based Hacking - Servers and Applications.md) -[7 - Wireless Network Hacking](7 - Wireless Network Hacking.md) +[07 - Wireless Network Hacking](7 - Wireless Network Hacking.md) -[8 - Mobile Communications and IoT](8 - Mobile Communications and IoT.md) +[08 - Mobile Communications and IoT](8 - Mobile Communications and IoT.md) -[9 - Security in Cloud Computing](9 - Security in Cloud Computing.md) +[09 - Security in Cloud Computing](9 - Security in Cloud Computing.md) [10 - Trojans and Other Attacks](10 - Trojans and Other Attacks.md)