Certified Ethical Hacker Vocabulary List Flashcards
Advanced Persistent Threat (APT)
Prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected.
Aircrack-ng
Suite of tools for auditing wireless networks.
Backdoor
Hidden method of bypassing normal authentication.
Anti-Forensics
Techniques used to thwart forensic analysis.
Arpwatch
Tool for monitoring Ethernet activity.
BloodHound
Tool for analyzing Active Directory relationships.
Black Hat
Hacker who violates computer security for personal gain or malicious reasons.
BeEF (Browser Exploitation Framework)
Tool for exploiting web browsers.
Cain and Abel
Password recovery tool for Microsoft operating systems.
Banner Grabbing
Technique to gain information about a computer system on a network.
Cobalt Strike
Adversary simulation software.
Blind SQL Injection
SQL injection attack where the attacker cannot see the output of the attack.
Botnet
Network of private computers infected with malicious software and controlled as a group.
Canary Tokens
Method for identifying unauthorized use by embedding triggers.
Credential Dumping
Process of obtaining account credentials.
Cyber Kill Chain
Framework developed by Lockheed Martin for understanding cyber attacks.
Cryptanalysis
Science of analyzing information systems to study the hidden aspects of the systems.
DNS Cache Poisoning
Attack that exploits vulnerabilities in the Domain Name System.
Deauthentication Attack
Disrupting the communication between a user and a wireless access point.
Data Exfiltration
Unauthorized transfer of data from a computer.
Darknet
Overlay network only accessible with specific software, configurations, or authorization.
Empire
Post-exploitation framework.
Dumpster Diving
Looking for information in garbage that can be used to attack a network.
Eavesdropping
Listening to communication between two parties without consent.
Exfiltration
Unauthorized transfer of data from a system.
Footprinting
Gathering information about a target system.
Exploit Kit
Software system designed to run on web servers, identifying software vulnerabilities on client machines.
Gatling Gun Attack
High-speed brute-force attack.
Gaining Access
Phase of a cyber attack where the attacker breaks into the system.
Ghost Phishing
Fake phishing attack used for training.
Hypervisor
Software, firmware, or hardware that creates and runs virtual machines.
Gray Hat
Hacker who sometimes violates laws or ethical standards but does not have the malicious intent typical of a black hat.
Hacktivism
Hacking to promote political ends.
Hydra
Password cracking tool.
Impacket
Collection of Python classes for working with network protocols.
Hping
Packet crafting tool for network security testing.
Identity Theft
Stealing someone’s identity to gain access to resources or benefits.
Jailbreaking
Removing restrictions on iOS devices.
John the Ripper
Password cracking tool.
Keylogging
Recording the keys struck on a keyboard.