Tools and Technologies for Ethical Hacking (CEH) Flashcards
Certified Ethical Hacker (CEH) Flashcards

| Front | Back |
| Burp Collaborator | Tool for detecting vulnerabilities that require external server interactions, like SSRF or DNS rebinding. |
| Burp Intruder | Tool for automating customized attacks on web applications by sending payloads to request parameters. |
| Burp Proxy | Tool used for intercepting, modifying, and analyzing HTTP and HTTPS traffic. |
| Burp Repeater | Tool for manually manipulating and testing HTTP requests. |
| Burp Scanner | Automated tool for identifying vulnerabilities like SQL injection and XSS in web applications. |
| Burp Suite | A web vulnerability scanner and penetration testing tool used for web application security. |
| Burp Suite Extensions | Add-ons developed to expand Burp Suite’s capabilities using the BApp Store or custom scripting. |
| Metasploit | A penetration testing framework used for discovering, exploiting, and validating system vulnerabilities. |
| Metasploit Armitage | GUI front-end for Metasploit aimed at streamlined collaboration and visualization for penetration testing. |
| Metasploit Auxiliary Module | Used for tasks like scanning, fuzzing, and sniffing without payload exploitation. |
| Metasploit Exploit Module | Used to deliver payloads and exploit system vulnerabilities. |
| Metasploit Framework | Central interface for managing exploits, payloads, and auxiliary modules. |
| Metasploit Meterpreter | Post-exploitation tool built into Metasploit for interacting with compromised systems. |
| Metasploit Payload | Code executed on a exploited system, such as reverse or bind shells. |
| Nmap | Network scanning tool used for discovering hosts and services on a network. |
| Nmap OS Detection | Feature that identifies the operating system running on remote hosts. |
| Nmap Port Scanning | Technique to identify open, closed, and filtered ports on a target system. |
| Nmap Scripting Engine (NSE) | Feature in Nmap used to automate network tasks and vulnerability detection. |
| Nmap Service Detection | Technique for identifying services and versions running on open ports. |
| Nmap Vulnerability Scanning | Feature for detecting and reporting known vulnerabilities in services and applications. |
| Wireshark | A network protocol analyzer used for packet capturing and analysis. |
| Wireshark Capture Filters | Used to restrict the packets captured to specific traffic types or conditions. |
| Wireshark Color Coding | System to visually distinguish packet types or traffic patterns during analysis. |
| Wireshark Decryption | Feature to decrypt SSL/TLS-encrypted traffic for inspection. |
| Wireshark Filters | Used to isolate and analyze specific traffic from large packet captures. |
| Wireshark Protocol Analysis | Feature that helps identify malicious or misconfigured traffic by inspecting protocol details. |
| Wireshark Remote Traffic Capture | Feature allowing packet capture on a remote interface using protocols like SSH or RPCAP. |
| Zenmap | GUI for Nmap, providing an easier way to conduct scans and visualize results. |
About the Flashcards
Flashcards for the Certified Ethical Hacker (CEH) exam provide a concise way to drill essential penetration-testing utilities and workflows. Each card pairs clear definitions with practical context. Students review how Nmap conducts port, service, and OS detection, leverages the NSE for scripted checks, and uses Zenmap to visualize scan results.
Cards highlight Metasploit auxiliary, exploit, payload, and post-exploitation modules; Wireshark filtering, protocol inspection, and decryption; plus Burp Suite tools such as Proxy, Scanner, Intruder, Repeater, and Collaborator. Mastering these terms and techniques helps candidates enumerate hosts, analyze packets, exploit weaknesses, and validate findings with confidence.
Topics covered in this flashcard deck:
- Nmap scanning techniques
- Metasploit modules & payloads
- Wireshark packet analysis
- Burp Suite web testing
- Vulnerability discovery workflow