Certified Ethical Hacker Vocabulary List Flashcards
Advanced Persistent Threat (APT)
Prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected.
Aircrack-ng
Suite of tools for auditing wireless networks.
Backdoor
Hidden method of bypassing normal authentication.
Anti-Forensics
Techniques used to thwart forensic analysis.
Arpwatch
Tool for monitoring Ethernet activity.
BloodHound
Tool for analyzing Active Directory relationships.
Black Hat
Hacker who violates computer security for personal gain or malicious reasons.
BeEF (Browser Exploitation Framework)
Tool for exploiting web browsers.
Cain and Abel
Password recovery tool for Microsoft operating systems.
Banner Grabbing
Technique to gain information about a computer system on a network.
Cobalt Strike
Adversary simulation software.
Blind SQL Injection
SQL injection attack where the attacker cannot see the output of the attack.
Botnet
Network of private computers infected with malicious software and controlled as a group.
Canary Tokens
Method for identifying unauthorized use by embedding triggers.
Credential Dumping
Process of obtaining account credentials.
Cyber Kill Chain
Framework developed by Lockheed Martin for understanding cyber attacks.
Cryptanalysis
Science of analyzing information systems to study the hidden aspects of the systems.
DNS Cache Poisoning
Attack that exploits vulnerabilities in the Domain Name System.
Deauthentication Attack
Disrupting the communication between a user and a wireless access point.
Data Exfiltration
Unauthorized transfer of data from a computer.
Darknet
Overlay network only accessible with specific software, configurations, or authorization.
Empire
Post-exploitation framework.
Dumpster Diving
Looking for information in garbage that can be used to attack a network.
Eavesdropping
Listening to communication between two parties without consent.