Bash, the Crucial Exams Chat Bot
AI Bot

Tools and Technologies for Ethical Hacking (CEH) Flashcards

Certified Ethical Hacker (CEH) Flashcards

Study our Tools and Technologies for Ethical Hacking (CEH) flashcards for the Certified Ethical Hacker (CEH) exam with 28+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
Certified Ethical Hacker (CEH) Course Header Image
FrontBack
Burp CollaboratorTool for detecting vulnerabilities that require external server interactions, like SSRF or DNS rebinding.
Burp IntruderTool for automating customized attacks on web applications by sending payloads to request parameters.
Burp ProxyTool used for intercepting, modifying, and analyzing HTTP and HTTPS traffic.
Burp RepeaterTool for manually manipulating and testing HTTP requests.
Burp ScannerAutomated tool for identifying vulnerabilities like SQL injection and XSS in web applications.
Burp SuiteA web vulnerability scanner and penetration testing tool used for web application security.
Burp Suite ExtensionsAdd-ons developed to expand Burp Suite’s capabilities using the BApp Store or custom scripting.
MetasploitA penetration testing framework used for discovering, exploiting, and validating system vulnerabilities.
Metasploit ArmitageGUI front-end for Metasploit aimed at streamlined collaboration and visualization for penetration testing.
Metasploit Auxiliary ModuleUsed for tasks like scanning, fuzzing, and sniffing without payload exploitation.
Metasploit Exploit ModuleUsed to deliver payloads and exploit system vulnerabilities.
Metasploit FrameworkCentral interface for managing exploits, payloads, and auxiliary modules.
Metasploit MeterpreterPost-exploitation tool built into Metasploit for interacting with compromised systems.
Metasploit PayloadCode executed on a exploited system, such as reverse or bind shells.
NmapNetwork scanning tool used for discovering hosts and services on a network.
Nmap OS DetectionFeature that identifies the operating system running on remote hosts.
Nmap Port ScanningTechnique to identify open, closed, and filtered ports on a target system.
Nmap Scripting Engine (NSE)Feature in Nmap used to automate network tasks and vulnerability detection.
Nmap Service DetectionTechnique for identifying services and versions running on open ports.
Nmap Vulnerability ScanningFeature for detecting and reporting known vulnerabilities in services and applications.
WiresharkA network protocol analyzer used for packet capturing and analysis.
Wireshark Capture FiltersUsed to restrict the packets captured to specific traffic types or conditions.
Wireshark Color CodingSystem to visually distinguish packet types or traffic patterns during analysis.
Wireshark DecryptionFeature to decrypt SSL/TLS-encrypted traffic for inspection.
Wireshark FiltersUsed to isolate and analyze specific traffic from large packet captures.
Wireshark Protocol AnalysisFeature that helps identify malicious or misconfigured traffic by inspecting protocol details.
Wireshark Remote Traffic CaptureFeature allowing packet capture on a remote interface using protocols like SSH or RPCAP.
ZenmapGUI for Nmap, providing an easier way to conduct scans and visualize results.

About the Flashcards

Flashcards for the Certified Ethical Hacker (CEH) exam provide a concise way to drill essential penetration-testing utilities and workflows. Each card pairs clear definitions with practical context. Students review how Nmap conducts port, service, and OS detection, leverages the NSE for scripted checks, and uses Zenmap to visualize scan results.

Cards highlight Metasploit auxiliary, exploit, payload, and post-exploitation modules; Wireshark filtering, protocol inspection, and decryption; plus Burp Suite tools such as Proxy, Scanner, Intruder, Repeater, and Collaborator. Mastering these terms and techniques helps candidates enumerate hosts, analyze packets, exploit weaknesses, and validate findings with confidence.

Topics covered in this flashcard deck:

  • Nmap scanning techniques
  • Metasploit modules & payloads
  • Wireshark packet analysis
  • Burp Suite web testing
  • Vulnerability discovery workflow
Share on...
Follow us on...