EC-Council • CEH
Validates proficiency in ethical hacking techniques and tools across 20 security domains, including reconnaissance, network scanning, vulnerability analysis, system hacking, malware threats, social engineering, web application attacks, SQL injection, cryptography, and cloud and IoT security.
Questions
594
Duration
240 minutes
Passing Score
70%
Difficulty
AssociateLast Updated
Feb 2026
The Certified Ethical Hacker (CEH), now in its 13th version (CEH v13), is EC-Council's flagship offensive security certification that validates a professional's ability to identify, exploit, and remediate vulnerabilities using the same tools and techniques as malicious hackers — but within a lawful, authorized context. Spanning 20 security domains and over 550 attack techniques, CEH v13 covers the full spectrum of ethical hacking methodology: from footprinting and reconnaissance through system hacking, malware analysis, social engineering, web application attacks, SQL injection, wireless network exploitation, and cloud and IoT security. The curriculum also integrates AI-driven hacking techniques, making CEH v13 the first ethical hacking certification to incorporate AI and machine learning as core competencies. Launched in September 2024, CEH v13 reflects the evolving threat landscape with updated modules on cloud environments (AWS, Azure), OT/ICS systems, and AI-powered offensive tools. The certification is globally recognized, listed on the U.S. Department of Defense (DoD) Approved Baseline Certifications list (DoD 8570/8140), and is administered through EC-Council's exam code 312-50.
CEH is designed for mid-career IT and security professionals who want to formalize and validate their offensive security knowledge. Primary target roles include penetration testers, security analysts, SOC analysts, network security engineers, security auditors, security consultants, and IT managers responsible for defensive strategy. Candidates typically have a background in networking, operating systems, or system administration and are looking to transition into or advance within offensive and red-team security roles. The certification is also widely pursued by professionals in government, defense contracting, and financial services who need credentials recognized by the DoD or regulated-industry compliance frameworks.
EC-Council does not enforce a formal degree requirement, but candidates must satisfy one of two eligibility paths. The first path requires completing an official EC-Council-accredited CEH training course, after which the candidate is automatically eligible to sit the exam. The second path allows self-study candidates with at least two years of verifiable information security work experience to apply directly by submitting an eligibility application form and paying a $100 non-refundable fee for EC-Council review. Regardless of path, candidates are strongly expected to have working knowledge of TCP/IP networking, Windows and Linux operating systems, and foundational security concepts. Familiarity with tools such as Nmap, Wireshark, and Metasploit is practically necessary to succeed on both the knowledge exam and the optional practical exam.
The CEH knowledge exam (exam code 312-50) consists of 125 multiple-choice questions to be completed in 240 minutes (4 hours). Questions are a mix of knowledge-based and scenario-based multiple-choice items. The exam is delivered either online via remote proctoring through EC-Council's portal or in person at Pearson VUE testing centers worldwide. Scoring uses a scaled model, meaning the exact passing threshold varies by exam form difficulty — typically falling between 60% and 85%, with approximately 70% as a general benchmark. The certification is valid for three years, after which holders must earn 120 EC-Council Continuing Education (ECE) credits or retake the exam. Separately, EC-Council offers the CEH Practical, a 6-hour, 20-challenge hands-on exam conducted in a live cyber range; passing both the knowledge exam and the practical earns the CEH Master designation.
The CEH certification is one of the most widely recognized offensive security credentials globally, directly qualifying holders for roles such as penetration tester, security analyst, cybersecurity engineer, SOC analyst, security consultant, and information security manager. Salary data from PayScale and Glassdoor indicates CEH-certified professionals earn an average base salary ranging from approximately $86,000 to over $147,000 in the United States, with penetration testers typically earning $95,000–$145,000 and information security managers reaching $90,000–$175,000. CEH holders who transition from network administration roles report salary increases of up to 54% according to EC-Council data. The certification's inclusion on the U.S. Department of Defense Approved Baseline Certifications list (DoD 8570/8140) makes it a mandatory or strongly preferred credential for government, military, and defense contractor positions — an advantage not shared by many competing certifications. Compared to alternatives like CompTIA PenTest+ (entry-level) or OSCP (more hands-on/advanced), CEH occupies a well-recognized middle ground that balances breadth of knowledge with industry name recognition, making it particularly effective for professionals entering or advancing within offensive security who need a credential that resonates with HR and hiring managers across both the public and private sectors.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 594 questions.
1. During reconnaissance, an ethical hacker uses Shodan to find internet-connected devices running a specific vulnerable software version. Which search filter identifies devices by Common Vulnerabilities and Exposures identifier? (Select one!)
Explanation
The vuln: filter in Shodan searches for devices with specific CVE identifiers that have been detected through vulnerability scanning and banner analysis. The cve: prefix is not a valid Shodan search filter. The vulnerability: prefix is not the correct Shodan syntax. The exploit: filter does not exist in Shodan search grammar.
2. An organization implements a security control where all database queries use parameterized statements with bound variables instead of string concatenation. Which OWASP Top 10 vulnerability does this mitigation primarily address? (Select one!)
Explanation
Parameterized queries with bound parameters are the primary defense against SQL injection attacks, which fall under the Injection category (A03:2021) in the OWASP Top 10. This technique separates SQL code from user data, preventing attackers from injecting malicious SQL commands. Broken Access Control involves authorization failures, not query construction. Security Misconfiguration relates to improper system settings. Authentication Failures involve credential and session management issues, not database query handling.
3. During a cloud penetration test, an ethical hacker discovers IAM credentials hardcoded in a public GitHub repository. The credentials have permissions to list and describe EC2 instances. Which AWS service can be exploited to gain additional information for lateral movement? (Select one!)
Explanation
EC2 instance metadata service provides information about running instances including IAM role credentials, user data, and security groups accessible from instances. If the compromised credentials can access instances or launch new ones, the metadata service can expose additional credentials and configuration data for lateral movement. CloudTrail logs require separate read permissions not mentioned in the scenario. S3 bucket access requires additional permissions beyond EC2 describe capabilities. Lambda environment variables require Lambda execution permissions. The metadata service is specifically tied to EC2 access and provides a common pivot point in cloud environments.
4. During a wireless penetration test, an ethical hacker wants to exploit WPS vulnerabilities without waiting for the full PIN brute force process. The tester executes: reaver -i wlan0mon -b AA:BB:CC:DD:EE:FF -K -vv. What attack technique does the -K flag enable? (Select one!)
Explanation
The -K flag in Reaver enables the Pixie Dust attack, which exploits vulnerabilities in WPS implementations that use weak or predictable pseudorandom number generators. This allows offline recovery of the WPS PIN by analyzing the randomness of nonces exchanged during WPS authentication, dramatically reducing attack time from hours to seconds. KRACK attacks target WPA2 four-way handshake vulnerabilities and are not WPS-related. Karma attacks involve creating rogue access points that respond to client probe requests, not WPS PIN attacks. Known plaintext attacks are cryptanalytic techniques against encryption algorithms, not specific to WPS PIN recovery.
5. A company stores sensitive data in an AWS S3 bucket. A security audit reveals the bucket has a public ACL allowing anyone to list and read objects. According to the shared responsibility model, who is responsible for this misconfiguration? (Select one!)
Explanation
Under the shared responsibility model, AWS is responsible for security OF the cloud (physical infrastructure, hardware, networking), while customers are responsible for security IN the cloud, including data classification, IAM policies, encryption, and access control configurations. S3 bucket ACLs and bucket policies are customer configurations, making the customer fully responsible for preventing public exposure. AWS provides tools like S3 Block Public Access and security warnings, but ultimately bucket permissions are customer-managed. This is a frequent exam topic because S3 misconfigurations are among the most common cloud security breaches. AWS cannot unilaterally secure customer data without potentially breaking legitimate use cases for public buckets.
One-time access to this exam