{"id":105,"date":"2025-04-12T03:00:20","date_gmt":"2025-04-11T19:00:20","guid":{"rendered":"https:\/\/chengyunpu.com\/wordpress\/?p=105"},"modified":"2025-10-07T09:22:10","modified_gmt":"2025-10-07T01:22:10","slug":"ceh-v12-engage-part-iv","status":"publish","type":"post","link":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/","title":{"rendered":"CEH v12 Engage Part IV"},"content":{"rendered":"\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Scenario<\/summary>\n<p>You have been hired as a part of the Red Team at CEHORG, an IT and ITES organization that deals with advanced research and development in the field of information security. It has offices all over the country connected in real-time by its network infrastructure.<\/p>\n\n\n\n<p>Your organization is worried about rising cybersecurity incidents and has entrusted you with a comprehensive security audit of the complete infrastructure.<\/p>\n\n\n\n<p>CEHORG\u2019s internal network consists of several subnets housing various organizational units like any large organization. The front office is connected to a separate subnet that connects to the company\u2019s public-facing computers. The company has installed multiple kiosks to help customers understand their products and services. The front office also has Wi-Fi connectivity to cater to the users who carry their smartphones and laptops.<\/p>\n\n\n\n<p>The CEHORG\u2019s internal network is made up of Militarized and Demilitarized zones. As a security precaution, and by design, all the internal resource zones are configured with different subnet IPs. The militarized zone houses the application servers that provide application frameworks for various departments. The Demilitarized Zone contains public-facing systems of the organization, such as web and mail servers. The headquarter\u2019s network topology and protocols are replicated worldwide in all its satellite offices for easy communication with the headquarters.<\/p>\n<\/details>\n\n\n\n<ul class=\"wp-block-list\"><\/ul>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Description<\/summary>\n<p>CEHv12 Skill Check is divided into four parts. All four parts represent a single target organization as described in the scenario. The objective of these skill checks is to apply learning from CEH (Certified Ethical Hacker) modules in a real-life scenario to solve challenges you will face in red team assignments in your job roles. The skill check will help you practice the skills acquired in the class and convert them into proficiency.<\/p>\n\n\n\n<p>Part 4 of CEH Skill Check covers Hacking Wireless Networks, Hacking Mobile Platforms, IoT and OT Hacking, Cloud Computing, and Cryptography modules. In this part, you must analyze wireless packet captures, use different attack vectors to exploit mobile devices, and audit IoT and OT systems\/networks for known threats. You need to note all the information discovered in this part of the Skill Check.<\/p>\n\n\n\n<p>On the cyber range, you will have access to Ethical Hacker Workstations,* EH Workstation \u2013 1* and EH Workstation \u2013 2. EH Workstation \u2013 1 is a Parrot Security machine and EH Workstation \u2013 2 is a Windows 11 machine. You can switch to these machines from the Resources tab.<\/p>\n\n\n\n<p>The credentials to access EH Workstation \u2013 1 (Parrot Security) machine are as below:<\/p>\n\n\n\n<p>Username: attacker Password: toor<\/p>\n\n\n\n<p>The credentials to access EH Workstation \u2013 2 (Windows 11) are as below:<\/p>\n\n\n\n<p>Username: Admin Password: Pa$$w0rd<\/p>\n\n\n\n<p>The credentials to access OpenVAS on EH Workstation \u2013 1 (Parrot Security) machine are as below:<\/p>\n\n\n\n<p>Username: admin Password: password<\/p>\n\n\n\n<p>Note: You can use username.txt and password.txt available on the Desktop of the EH Workstation \u2013 1 (Parrot Security) machine for any credentials\/password cracking attempt.<\/p>\n<\/details>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-1\">Challenge 1:<\/h3>\n\n\n\n<p>The mobile device of an employee in CEHORG has been hacked by the hacker to perform DoS attack on one of the server in company network. You are assigned to analyse &#8220;Andro.pcapng&#8221; located in Documents directory of EH workstation-2 and identify the severity level of the attack. (Note: perform deep down Expert Info analysis). (Format: Aaaaaaa )<\/p>\n\n\n\n<p>Wireshark\u6253\u958bAnalyze \u2013&gt; Expert information<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hackmd.io\/_uploads\/HJsis3Fi0.png\" alt=\"image\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-2\"><a href=\"#Challenge-2\"><\/a>Challenge 2:<\/h3>\n\n\n\n<p>An ex-employee of CEHORG is suspected to be performing insider attack. You are assigned a task to attain KEYCODE-75 used in the employees&#8217; mobile phone. Note: use option p in PhoneSploit for next page. (Format: AAAAAAAAAA )<\/p>\n\n\n\n<p>\u7528PhoneSploit\uff0c\u9023\u63a5\u904e\u5f8c\u6309p\u5230\u7b2c\u4e8c\u9801\u6709\u500b\u53eb\u505aUSE KEYCODE\u7684\u9078\u9805<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hackmd.io\/_uploads\/Bynb2f3o0.png\" alt=\"image\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-3\"><a href=\"#Challenge-3\"><\/a>Challenge 3:<\/h3>\n\n\n\n<p>An employee in CEHORG has secretly acquired Confidential access ID through an application from the company. He has saved this information on the Downloads folder of his Android mobile phone. You have been assigned a task as an ethical hacker to access the file and delete it covertly. Enter the account information present in the file. Note: Only provide the numeric values in the answer field. (Format: NNNNNNNN)<\/p>\n\n\n\n<p>\u900f\u904eadb \u9023\u63a5\u597dvictim\u4e4b\u5f8c\u53bb\u5230\/sdcard\/Download\/\u88e1\u9762\u6709\u500btxt\u6a94\u6848\u53ca\u662f\u7b54\u6848<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hackmd.io\/_uploads\/SkC4pG3jC.png\" alt=\"image\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-4\"><a href=\"#Challenge-4\"><\/a>Challenge 4:<\/h3>\n\n\n\n<p>An attacker has hacked one of the employees android device in CEHORG and initiated LOIC attack from the device. You are an ethical hacker who had obtained a screenshot of the attack using a background application. Obtain the screenshot of the attack using PhoneSploit from the attacked mobile device and determine the targeted machine IP along with send method. (Format: NNN.NN.N.NN*AAAA)<\/p>\n\n\n\n<p>\u900f\u904ePhontSploit\u88e1\u9762\u5176\u4e2d\u4e00\u500b\u9078\u9805\u53ef\u4ee5\u62ff\u53d6victim\u88e1\u9762\u6a94\u6848\uff0c\u9019\u5f35\u5716\u7247\u8def\u5f91\u70ba\/sdcard\/DCIM\/capture.png<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hackmd.io\/_uploads\/HysI0fhoR.png\" alt=\"image\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-5\"><a href=\"#Challenge-5\"><\/a>Challenge 5:<\/h3>\n\n\n\n<p>An attacker installed a malicious mobile application &#8216;AntiMalwarescanner.apk&#8217; on the victims android device which is located in EH workstation-2 documents folder. You are assigned a task to perform security audit on the mobile application and find out whether the application using permission to Read-call-logs. (Format: Aaa )<\/p>\n\n\n\n<p>\u4e1f\u5230\u7dda\u4e0a\u7db2\u7ad9<a href=\"https:\/\/sisik.eu\/apk-tool\" target=\"_blank\" rel=\"noreferrer noopener\">SISIK<\/a>\uff0c\u67e5\u770b\u5206\u6790\u7d50\u679c\u5373\u53ef\u5f97\u77e5\u7b54\u6848<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hackmd.io\/_uploads\/SkO-k73j0.png\" alt=\"image\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-6\"><a href=\"#Challenge-6\"><\/a>Challenge 6:<\/h3>\n\n\n\n<p>An attacker had sent a message 166.150.247.183\/US to the victim. You are assigned to perform footprinting using <a href=\"http:\/\/shodan.io\" target=\"_blank\" rel=\"noreferrer noopener\">shodan.io<\/a> in order to identify whether the message belongs to SCADA\/ICS\/IoT systems in US. (Format: AaA)<\/p>\n\n\n\n<p>EC\u984c\u76ee\u51fa\u721bshodan \u6839\u672c\u6c92\u9019\u53f0<br>ans:IoT<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-7\"><a href=\"#Challenge-7\"><\/a>Challenge 7:<\/h3>\n\n\n\n<p>CEHORG hosts multiple IOT devices and sensors to manage its supply chain fleet. You are assinged a task to examine the file &#8220;IOT Traffic.pcapng&#8221; located in the Home directory of the root user in the &#8220;EH Workstation &#8211; 1&#8221; machine. Analyze the packet and find the topic of the message sent to the sensor. (Format: Aaaaa*Aaaaa)<\/p>\n\n\n\n<p>filter\u4e0bmqtt\u56e0\u70ba\u662f\u8981\u770bIoT\uff0c\u4e4b\u5f8c\u53ef\u4ee5\u770b\u5230\u6709publish messeage \u8a73\u7d30\u67e5\u770b\u5373\u53ef\u770b\u5230\u7b54\u6848<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hackmd.io\/_uploads\/r1to172sA.png\" alt=\"image\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-8\"><a href=\"#Challenge-8\"><\/a>Challenge 8:<\/h3>\n\n\n\n<p>CEHORG hosts multiple IoT devices and sensors to manage its supply chain fleet. You are assinged a task to examine the file &#8220;IOT Traffic.pcapng&#8221; located in the Home directory of the root user in the &#8220;EH Workstation &#8211; 1&#8221; machine. Analyze the packet and find the topic of the message sent to the sensor. (Format: )<\/p>\n\n\n\n<p>EC\u51fa\u721b\uff0c\u8ddf\u4e0a\u4e00\u6a21\u4e00\u6a23\uff0c\u4f46\u662f\u7b54\u6848\u600e\u9ebc\u586b\u90fd\u662f\u932f\u7684<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-9\"><a href=\"#Challenge-9\"><\/a>Challenge 9:<\/h3>\n\n\n\n<p>CEHORG hosts multiple IOT devices and network sensors to manage its IT-department. You are assigned a task to examine the file &#8220;NetworkNS_Traffic.pcapng&#8221; located in the Documents folder of the user in the &#8220;EH Workstation &#8211; 2&#8221; machine. Analyze the packet and find the alert message sent to the sensor. (Format: Aaaa Aaa*aa *aaaa)<\/p>\n\n\n\n<p>\u4e00\u6a23IoT filter \u4e0bmqtt\uff0c\u627e\u5230publish messeage \u2013&gt; Follow tcp stream<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hackmd.io\/_uploads\/rJvax7hoC.png\" alt=\"image\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-10\"><a href=\"#Challenge-10\"><\/a>Challenge 10:<\/h3>\n\n\n\n<p>You have received a folder named &#8220;Archive&#8221; from a vendor. You suspect that someone might have tampered with the files during transmission. The Original hashes of the files have been sent by the sender separately and are stored in a file named FileHashes.txt stored in the Document folder in the &#8220;EH Workstation \u2013 2&#8221; machine. Your task is to check the integrity of the files by comparing the MD5 hashes. Compare the hash values and determine the file name that has been tampered with. Note: Exclude the file extension in the answer field. The answer is case-sensitive. (Format: Aaaaaa)<\/p>\n\n\n\n<p>\u7528MD5 calc\u958b\u984c\u76ee\u8981\u6c42\u8cc7\u6599\u593e\u8a08\u7b97\uff0c\u6bd4\u5c0d\u984c\u76ee\u8981\u6c42\u6a94\u6848FileHashes.txt\uff0c\u767c\u73feQuotes\u4e0d\u4e00\u6a23<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hackmd.io\/_uploads\/H12ubQ2oC.png\" alt=\"image\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-11\"><a href=\"#Challenge-11\"><\/a>Challenge 11:<\/h3>\n\n\n\n<p>An attacker has intruded into the CEHORG network with malicious intent. He has identified a vulnerability in a machine. He has encoded the machine&#8217;s IP address and left it in the database. While auditing the database, the encoded file was identified by the database admin. Decode the EncodedFile.txt file in the Document folder in the &#8220;EH Workstation \u2013 2&#8221; machine and enter the IP address as the answer. (Hint: Password to decode the file is Pa$$w0rd). (Format: NN.NN,NN,NN)<\/p>\n\n\n\n<p>EncodedFile.txt\u9019\u6587\u4ef6\u6253\u958b\u5c31\u6709\u5beb\u5230BCText&#8230;&#8230;\uff0c\u6253\u958b\u90a3\u500b\u5de5\u5177\uff0c\u8f38\u5165\u984c\u76ee\u7d66\u7684\u5bc6\u78bc\u5373\u53ef<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hackmd.io\/_uploads\/SJ6CZmhoR.png\" alt=\"image\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-12\"><a href=\"#Challenge-12\"><\/a>Challenge 12:<\/h3>\n\n\n\n<p>The Access code of an employee was stolen from the CEHORG database. The attacker has encrypted the file using the Advance Encryption Package. You have been assigned a task to decrypt the file; the organization has retained the cipher file &#8220;&#8221;AccessCode.docx.aes&#8221;&#8221; in the Document folder in the &#8220;&#8221;EH Workstation \u2013 2&#8243;&#8221; machine. Determine the access code by decrypting the file. Hint: Use &#8220;&#8221;qwerty&#8221;&#8221; as the decryption password. Note: Advanced Encryption Package is available at E:\\CEH-Tools\\CEHv12 Module 20 Cryptography\\Cryptography Tools. (Format: AAA<em>AAA<\/em>NNNN)<\/p>\n\n\n\n<p>\u4e5f\u662f\u4e00\u6a23\u6a94\u6848\u540d\u7a31\u7684\u5c3e\u7aef\u900f\u9732\u4e86\u4f7f\u7528\u7684\u5de5\u5177\uff0c\u5728\u672c\u6a5f\u641c\u5c0baes\uff0c\u5c31\u627e\u5230AES-Tool\uff0c\u6253\u958b\u5f8c\u958b\u6587\u4ef6\u8f38\u5165\u5bc6\u78bc\uff0c\u4e4b\u5f8c\u5c31\u53ef\u4ee5\u62ff\u5230\u4e86<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hackmd.io\/_uploads\/ByMPzm2sR.png\" alt=\"image\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Challenge-13\"><a href=\"#Challenge-13\"><\/a>Challenge 13:<\/h3>\n\n\n\n<p>A VeraCrypt volume file &#8220;secret&#8221; is stored on the Document folder in the &#8220;EH Workstation \u2013 2&#8221; machine. You are an ethical hacker working with CEHORG; you have been tasked to decrypt the encrypted volume and determine the number of files stored in the volume. (Hint: Password: test). (Format: N)<\/p>\n\n\n\n<p>\u984c\u76ee\u6709\u63d0\u5230VeraCrypt\uff0c\u6253\u958b\u9019\u5de5\u5177\u5f8c\u4e00\u6a23\u7121\u8166\u7684\u8f38\u5165\u5bc6\u78bc\u6253\u958b\u6a94\u6848\u5c31\u6709\u7b54\u6848<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hackmd.io\/_uploads\/rkynGmho0.png\" alt=\"image\"\/><\/figure>\n\n\n\n<p>Challenge 14:<\/p>\n\n\n\n<p>An attacker had sent a file cryt-128-06encr.hex containing ransom file password, which is located in documents folder of EH-workstation-2. You are assigned a task to decrypt the file using cryp tool. Perform cryptanalysis, Identify the algorithm used for file encryption and hidden text. Note: check filename for key length and hex characters. (Format: Aaaaaaa\/<strong>aa<\/strong>aA*a)<\/p>\n\n\n\n<p>\u9019\u984c\u8981\u901a\u9748\u5bc6\u78bc\u3001\u52a0\u5bc6\u985e\u578b\uff0c\u5be6\u5728\u6c92\u901a\u9748\u51fa\u4f86<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Challenge 1: The mob [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[11],"tags":[],"class_list":["post-105","post","type-post","status-publish","format-standard","hentry","category-ceh-practical"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CEH v12 Engage Part IV - my article<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CEH v12 Engage Part IV - my article\" \/>\n<meta property=\"og:description\" content=\"Challenge 1: The mob [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/\" \/>\n<meta property=\"og:site_name\" content=\"my article\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-11T19:00:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-07T01:22:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackmd.io\/_uploads\/HJsis3Fi0.png\" \/>\n<meta name=\"author\" content=\"chengyunpu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005:\" \/>\n\t<meta name=\"twitter:data1\" content=\"chengyunpu\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/\"},\"author\":{\"name\":\"chengyunpu\",\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/#\/schema\/person\/f697887c7eea19b57c04d0a2bb4d9411\"},\"headline\":\"CEH v12 Engage Part IV\",\"datePublished\":\"2025-04-11T19:00:20+00:00\",\"dateModified\":\"2025-10-07T01:22:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/\"},\"wordCount\":1384,\"publisher\":{\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/#\/schema\/person\/f697887c7eea19b57c04d0a2bb4d9411\"},\"image\":{\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackmd.io\/_uploads\/HJsis3Fi0.png\",\"articleSection\":[\"CEH Practical\"],\"inLanguage\":\"zh-TW\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/\",\"url\":\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/\",\"name\":\"CEH v12 Engage Part IV - my article\",\"isPartOf\":{\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackmd.io\/_uploads\/HJsis3Fi0.png\",\"datePublished\":\"2025-04-11T19:00:20+00:00\",\"dateModified\":\"2025-10-07T01:22:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#primaryimage\",\"url\":\"https:\/\/hackmd.io\/_uploads\/HJsis3Fi0.png\",\"contentUrl\":\"https:\/\/hackmd.io\/_uploads\/HJsis3Fi0.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\/\/chengyunpu.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CEH v12 Engage Part IV\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/#website\",\"url\":\"https:\/\/chengyunpu.com\/wordpress\/\",\"name\":\"my article\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/#\/schema\/person\/f697887c7eea19b57c04d0a2bb4d9411\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/chengyunpu.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/#\/schema\/person\/f697887c7eea19b57c04d0a2bb4d9411\",\"name\":\"chengyunpu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8e26f1a47b73420e32e35b25e19c6abf045eb208b1a34d5d90f5d166505983d2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8e26f1a47b73420e32e35b25e19c6abf045eb208b1a34d5d90f5d166505983d2?s=96&d=mm&r=g\",\"caption\":\"chengyunpu\"},\"logo\":{\"@id\":\"https:\/\/chengyunpu.com\/wordpress\/#\/schema\/person\/image\/\"},\"sameAs\":[\"http:\/\/chengyunpu.com\/wordpress\"],\"url\":\"https:\/\/chengyunpu.com\/wordpress\/author\/chengyunpu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CEH v12 Engage Part IV - my article","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/","og_locale":"zh_TW","og_type":"article","og_title":"CEH v12 Engage Part IV - my article","og_description":"Challenge 1: The mob [&hellip;]","og_url":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/","og_site_name":"my article","article_published_time":"2025-04-11T19:00:20+00:00","article_modified_time":"2025-10-07T01:22:10+00:00","og_image":[{"url":"https:\/\/hackmd.io\/_uploads\/HJsis3Fi0.png","type":"","width":"","height":""}],"author":"chengyunpu","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005:":"chengyunpu","\u9810\u4f30\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#article","isPartOf":{"@id":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/"},"author":{"name":"chengyunpu","@id":"https:\/\/chengyunpu.com\/wordpress\/#\/schema\/person\/f697887c7eea19b57c04d0a2bb4d9411"},"headline":"CEH v12 Engage Part IV","datePublished":"2025-04-11T19:00:20+00:00","dateModified":"2025-10-07T01:22:10+00:00","mainEntityOfPage":{"@id":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/"},"wordCount":1384,"publisher":{"@id":"https:\/\/chengyunpu.com\/wordpress\/#\/schema\/person\/f697887c7eea19b57c04d0a2bb4d9411"},"image":{"@id":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#primaryimage"},"thumbnailUrl":"https:\/\/hackmd.io\/_uploads\/HJsis3Fi0.png","articleSection":["CEH Practical"],"inLanguage":"zh-TW"},{"@type":"WebPage","@id":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/","url":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/","name":"CEH v12 Engage Part IV - my article","isPartOf":{"@id":"https:\/\/chengyunpu.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#primaryimage"},"image":{"@id":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#primaryimage"},"thumbnailUrl":"https:\/\/hackmd.io\/_uploads\/HJsis3Fi0.png","datePublished":"2025-04-11T19:00:20+00:00","dateModified":"2025-10-07T01:22:10+00:00","breadcrumb":{"@id":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#primaryimage","url":"https:\/\/hackmd.io\/_uploads\/HJsis3Fi0.png","contentUrl":"https:\/\/hackmd.io\/_uploads\/HJsis3Fi0.png"},{"@type":"BreadcrumbList","@id":"https:\/\/chengyunpu.com\/wordpress\/2025\/04\/12\/ceh-v12-engage-part-iv\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/chengyunpu.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"CEH v12 Engage Part IV"}]},{"@type":"WebSite","@id":"https:\/\/chengyunpu.com\/wordpress\/#website","url":"https:\/\/chengyunpu.com\/wordpress\/","name":"my article","description":"","publisher":{"@id":"https:\/\/chengyunpu.com\/wordpress\/#\/schema\/person\/f697887c7eea19b57c04d0a2bb4d9411"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chengyunpu.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":["Person","Organization"],"@id":"https:\/\/chengyunpu.com\/wordpress\/#\/schema\/person\/f697887c7eea19b57c04d0a2bb4d9411","name":"chengyunpu","image":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/chengyunpu.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8e26f1a47b73420e32e35b25e19c6abf045eb208b1a34d5d90f5d166505983d2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8e26f1a47b73420e32e35b25e19c6abf045eb208b1a34d5d90f5d166505983d2?s=96&d=mm&r=g","caption":"chengyunpu"},"logo":{"@id":"https:\/\/chengyunpu.com\/wordpress\/#\/schema\/person\/image\/"},"sameAs":["http:\/\/chengyunpu.com\/wordpress"],"url":"https:\/\/chengyunpu.com\/wordpress\/author\/chengyunpu\/"}]}},"_links":{"self":[{"href":"https:\/\/chengyunpu.com\/wordpress\/wp-json\/wp\/v2\/posts\/105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chengyunpu.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chengyunpu.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chengyunpu.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chengyunpu.com\/wordpress\/wp-json\/wp\/v2\/comments?post=105"}],"version-history":[{"count":2,"href":"https:\/\/chengyunpu.com\/wordpress\/wp-json\/wp\/v2\/posts\/105\/revisions"}],"predecessor-version":[{"id":107,"href":"https:\/\/chengyunpu.com\/wordpress\/wp-json\/wp\/v2\/posts\/105\/revisions\/107"}],"wp:attachment":[{"href":"https:\/\/chengyunpu.com\/wordpress\/wp-json\/wp\/v2\/media?parent=105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chengyunpu.com\/wordpress\/wp-json\/wp\/v2\/categories?post=105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chengyunpu.com\/wordpress\/wp-json\/wp\/v2\/tags?post=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}