Certified Ethical Hacker Vocabulary List Flashcards

1
Q

Advanced Persistent Threat (APT)

A

Prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Aircrack-ng

A

Suite of tools for auditing wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backdoor

A

Hidden method of bypassing normal authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anti-Forensics

A

Techniques used to thwart forensic analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Arpwatch

A

Tool for monitoring Ethernet activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BloodHound

A

Tool for analyzing Active Directory relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Black Hat

A

Hacker who violates computer security for personal gain or malicious reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BeEF (Browser Exploitation Framework)

A

Tool for exploiting web browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cain and Abel

A

Password recovery tool for Microsoft operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Banner Grabbing

A

Technique to gain information about a computer system on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cobalt Strike

A

Adversary simulation software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blind SQL Injection

A

SQL injection attack where the attacker cannot see the output of the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Botnet

A

Network of private computers infected with malicious software and controlled as a group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Canary Tokens

A

Method for identifying unauthorized use by embedding triggers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Credential Dumping

A

Process of obtaining account credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cyber Kill Chain

A

Framework developed by Lockheed Martin for understanding cyber attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptanalysis

A

Science of analyzing information systems to study the hidden aspects of the systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS Cache Poisoning

A

Attack that exploits vulnerabilities in the Domain Name System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Deauthentication Attack

A

Disrupting the communication between a user and a wireless access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Exfiltration

A

Unauthorized transfer of data from a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Darknet

A

Overlay network only accessible with specific software, configurations, or authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Empire

A

Post-exploitation framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dumpster Diving

A

Looking for information in garbage that can be used to attack a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Eavesdropping

A

Listening to communication between two parties without consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Exfiltration
Unauthorized transfer of data from a system.
19
Footprinting
Gathering information about a target system.
19
Exploit Kit
Software system designed to run on web servers, identifying software vulnerabilities on client machines.
19
Gatling Gun Attack
High-speed brute-force attack.
20
Gaining Access
Phase of a cyber attack where the attacker breaks into the system.
21
Ghost Phishing
Fake phishing attack used for training.
21
Hypervisor
Software, firmware, or hardware that creates and runs virtual machines.
22
Gray Hat
Hacker who sometimes violates laws or ethical standards but does not have the malicious intent typical of a black hat.
23
Hacktivism
Hacking to promote political ends.
24
Hydra
Password cracking tool.
24
Impacket
Collection of Python classes for working with network protocols.
24
Hping
Packet crafting tool for network security testing.
25
Identity Theft
Stealing someone’s identity to gain access to resources or benefits.
26
Jailbreaking
Removing restrictions on iOS devices.
27
John the Ripper
Password cracking tool.
28
Keylogging
Recording the keys struck on a keyboard.
29
Kismet
Wireless network detector and sniffer.
30
Nmap
Network scanning tool.
30
LFI (Local File Inclusion)
Vulnerability that allows an attacker to include files on a server.
30
Log Poisoning
Adding malicious data to log files.
31
LaZagne
Tool to retrieve passwords stored on a local computer.
31
Lateral Movement
Moving through a network after gaining initial access.
32
Malleable C2
Customizable command and control communication profiles.
33
Mantrap
Physical security device that controls access to a secure area.
33
Maltego
Tool for open-source intelligence and forensics.
34
MITM (Man-in-the-Middle)
Attack where the attacker secretly relays and possibly alters communication.
34
Nikto
Web server scanner.
35
Metasploit
Penetration testing framework.
36
Ncat
Feature-packed networking utility.
37
NoSQL Injection
Injection attack against NoSQL databases.
37
Null Session
Unauthorized connection to a Windows system.
38
NTDS.dit
Database that stores Active Directory data.
39
OWASP ZAP
Web application security scanner.
39
Rainbow Table
Precomputed table for reversing cryptographic hash functions.
39
Pescatore Attack
Wireless attack targeting printers.
40
OSINT (Open Source Intelligence)
Information gathered from publicly available sources.
41
Pass the Hash
Attack that uses the hashed value of a password.
42
Password Spraying
Attempting to gain access to a large number of accounts with a few commonly used passwords.
42
Ransomware
Malware that locks or encrypts files until a ransom is paid.
43
Privilege Escalation
Exploiting a bug or design flaw to gain higher access.
43
Piggybacking
Unauthorized person gaining access to a restricted area by following an authorized person.
43
Pharming
Redirecting website traffic to another, fraudulent website.
44
Pivoting
Using one compromised system to attack other systems.
45
Post-Exploitation
Activities performed after gaining access to a system.
46
PowerShell Empire
Post-exploitation framework using PowerShell.
47
Red Team
Group simulating an attack on an organization to test its defenses.
47
Red Team
Analyzing software to understand its components.
48
Sandboxing
Isolating applications to prevent them from affecting the rest of the system.
49
Shellcode
Set of instructions used as a payload in the exploitation of a vulnerability.
49
Rootkit
Malicious software designed to hide the existence of certain processes.
50
Shoulder Surfing
Observing someone's screen or keyboard to gain information.
50
Skimming
Stealing credit card information using a skimmer device.
50
Scapy
Packet manipulation tool.
50
Silent Circle
Secure communication platform.
51
Side-Channel Attack
Attack based on information gained from the physical implementation of a system.
51
Shodan
Search engine for Internet-connected devices.
51
Smishing
Phishing conducted through SMS.
52
Social Engineering
Manipulating people into divulging confidential information.
53
Spoofing
Pretending to be something or someone else.
53
Spear Phishing
Targeted phishing attack.
54
SQL Injection
Injection attack where malicious SQL code is executed.
55
Steganography
Concealing messages within another file, message, or image.
55
Tails
Live operating system focused on privacy and anonymity.
56
Teardrop Attack
Attack causing fragmentation of packets.
56
Threat Intelligence
Information about threats to an organization's security.
57
Tor
Anonymity network directing internet traffic through a free, worldwide, volunteer overlay network.
58
Trojan Horse
Malware disguised as legitimate software.
59
Tunneling
Encapsulating one protocol within another.
59
UAC (User Account Control)
Security feature in Windows to prevent unauthorized changes.
60
Vishing
Phishing conducted through voice calls.
60
Web Shell
Script that can be uploaded to a web server to enable remote administration.
61
Wardriving
Searching for Wi-Fi networks by moving around.
62
Watering Hole Attack
Attack targeting a specific group by infecting websites they frequently visit.
63
Whaling
Targeted phishing attack aimed at high-profile individuals.
64
Wireshark
Network protocol analyzer.
65
Zero-Day
Exploit for a vulnerability that is not yet known to the vendor.