Bash, the Crucial Exams Chat Bot
AI Bot

Tools and Technologies for Ethical Hacking (CEH)  Flashcards

Certified Ethical Hacker (CEH) Flashcards

FrontBack
Burp CollaboratorTool for detecting vulnerabilities that require external server interactions, like SSRF or DNS rebinding.
Burp IntruderTool for automating customized attacks on web applications by sending payloads to request parameters.
Burp ProxyTool used for intercepting, modifying, and analyzing HTTP and HTTPS traffic.
Burp RepeaterTool for manually manipulating and testing HTTP requests.
Burp ScannerAutomated tool for identifying vulnerabilities like SQL injection and XSS in web applications.
Burp SuiteA web vulnerability scanner and penetration testing tool used for web application security.
Burp Suite ExtensionsAdd-ons developed to expand Burp Suite’s capabilities using the BApp Store or custom scripting.
MetasploitA penetration testing framework used for discovering, exploiting, and validating system vulnerabilities.
Metasploit ArmitageGUI front-end for Metasploit aimed at streamlined collaboration and visualization for penetration testing.
Metasploit Auxiliary ModuleUsed for tasks like scanning, fuzzing, and sniffing without payload exploitation.
Metasploit Exploit ModuleUsed to deliver payloads and exploit system vulnerabilities.
Metasploit FrameworkCentral interface for managing exploits, payloads, and auxiliary modules.
Metasploit MeterpreterPost-exploitation tool built into Metasploit for interacting with compromised systems.
Metasploit PayloadCode executed on a exploited system, such as reverse or bind shells.
NmapNetwork scanning tool used for discovering hosts and services on a network.
Nmap OS DetectionFeature that identifies the operating system running on remote hosts.
Nmap Port ScanningTechnique to identify open, closed, and filtered ports on a target system.
Nmap Scripting Engine (NSE)Feature in Nmap used to automate network tasks and vulnerability detection.
Nmap Service DetectionTechnique for identifying services and versions running on open ports.
Nmap Vulnerability ScanningFeature for detecting and reporting known vulnerabilities in services and applications.
WiresharkA network protocol analyzer used for packet capturing and analysis.
Wireshark Capture FiltersUsed to restrict the packets captured to specific traffic types or conditions.
Wireshark Color CodingSystem to visually distinguish packet types or traffic patterns during analysis.
Wireshark DecryptionFeature to decrypt SSL/TLS-encrypted traffic for inspection.
Wireshark FiltersUsed to isolate and analyze specific traffic from large packet captures.
Wireshark Protocol AnalysisFeature that helps identify malicious or misconfigured traffic by inspecting protocol details.
Wireshark Remote Traffic CaptureFeature allowing packet capture on a remote interface using protocols like SSH or RPCAP.
ZenmapGUI for Nmap, providing an easier way to conduct scans and visualize results.
This deck covers widely used ethical hacking tools such as Nmap, Metasploit, Wireshark, and Burp Suite, along with their applications in different hacking phases.
Share on...
Follow us on...