CEH study cards Flashcards
Address Resolution Protocol (ARP)
A protocol used to resolve the owner of a given
MAC address when given a specific IP address. The companion to ARP is Reverse Address
Resolution Protocol (RARP).
ARP cache poisoning
A technique by which the ARP cache or table on a target system
is altered according to the goals of the attacker. Typically, the goal is to change the path of
traffic or queries.
backdoor
The process of using tools such as Telnet to retrieve information for a
service with the goal of identification and capabilities.
buffer
A discrete section of memory used to temporarily hold results and instructions during
execution of an application.
buffer overflow
An attack in which code is injected into a buffer with the intention of
interrupting or taking over the execution of an application.
Common Internet File System (CIFS)/Server Message Block (SMB)
A network filesharing
protocol that is implemented in Microsoft operating systems. CIFS is a more
modern implementation of the SMB protocol.
covert channel
A method of transferring data or instructions in a system in a way that is
counter to its intended design or functioning.
cross-site scripting (XSS)
A method of breaching security that exploits the technology of
dynamically generated web pages. In this type of attack, a script is delivered along with normal
content to be processed by a victim’s system. Because dynamic websites rely on user input, a
malicious user can input a malicious script into the page by hiding it within legitimate requests.
demilitarized zone (DMZ)
A buffer zone between an intranet and the Internet. Typically
constructed with firewalls with the intention of hosting publicly accessible services.
egress filtering
A method used to prevent traffic matching certain criteria from exiting
the network. Typically implemented with routers or firewalls.
enumeration
A method of exploring the services and resources of a system to ascertain
the nature of the target.
firewalking
A method used to discover the configuration and operation of a firewall.
footprinting
The gathering of reconnaissance or information about an environment.
Fraggle Attack
A UDP-based DoS attack that overwhelms a target with a large amount
of traffic. The attack utilizes an intermediate network between the attacker and the target,
which amplifies the force of the attack.
fragmentation
The breaking of packets into smaller pieces. Completely normal in the
operation of a network; however, using a packet crafter, fragmentation may be used to
evade an NIDS or firewall.
gray hat
A hacker who may work both offensively and defensively at times. Also considered
to be an individual who was a black hat at one time and later became a white hat. It is
not uncommon for these types of hackers to work for monetary or personal gain.
handler
A system that is used to issue commands and other instructions to the members
of a botnet.
hash
The fixed-length value that results from a hash function.
hash function
An algorithm used to generate a unique fixed-length value for each input.
honeynet
A group of systems or networks set up with the intention of looking vulnerable
to attract attackers.
honeypot
A single system designed to entice attackers by appearing to be vulnerable.
Hypertext Transfer Protocol (HTTP)
A protocol used to exchange unencrypted
information typically involving web pages or web services.
Hypertext Transport Protocol Secure (HTTPS)
HTTP that uses SSL to encrypt its
communication.
ingress filtering
The method of blocking or allowing traffic based on rules about what is
and isn’t accepted on a network.