🔥 40% Off Crucial Exams Memberships — Deal ends today!

3 hours, 32 minutes remaining!
Bash, the Crucial Exams Chat Bot
AI Bot

Tools and Technologies for Ethical Hacking (CEH)  Flashcards

Certified Ethical Hacker (CEH) Flashcards

Metasploit Framework
Add-ons developed to expand Burp Suite’s capabilities using the BApp Store or custom scripting.
Feature allowing packet capture on a remote interface using protocols like SSH or RPCAP.
Code executed on a exploited system, such as reverse or bind shells.
Metasploit Payload
Burp Suite Extensions
Wireshark Remote Traffic Capture
Nmap
Network scanning tool used for discovering hosts and services on a network.
Metasploit Exploit Module
Central interface for managing exploits, payloads, and auxiliary modules.
Used to deliver payloads and exploit system vulnerabilities.
FrontBack
Burp CollaboratorTool for detecting vulnerabilities that require external server interactions, like SSRF or DNS rebinding.
Burp IntruderTool for automating customized attacks on web applications by sending payloads to request parameters.
Burp ProxyTool used for intercepting, modifying, and analyzing HTTP and HTTPS traffic.
Burp RepeaterTool for manually manipulating and testing HTTP requests.
Burp ScannerAutomated tool for identifying vulnerabilities like SQL injection and XSS in web applications.
Burp SuiteA web vulnerability scanner and penetration testing tool used for web application security.
Burp Suite ExtensionsAdd-ons developed to expand Burp Suite’s capabilities using the BApp Store or custom scripting.
MetasploitA penetration testing framework used for discovering, exploiting, and validating system vulnerabilities.
Metasploit ArmitageGUI front-end for Metasploit aimed at streamlined collaboration and visualization for penetration testing.
Metasploit Auxiliary ModuleUsed for tasks like scanning, fuzzing, and sniffing without payload exploitation.
Metasploit Exploit ModuleUsed to deliver payloads and exploit system vulnerabilities.
Metasploit FrameworkCentral interface for managing exploits, payloads, and auxiliary modules.
Metasploit MeterpreterPost-exploitation tool built into Metasploit for interacting with compromised systems.
Metasploit PayloadCode executed on a exploited system, such as reverse or bind shells.
NmapNetwork scanning tool used for discovering hosts and services on a network.
Nmap OS DetectionFeature that identifies the operating system running on remote hosts.
Nmap Port ScanningTechnique to identify open, closed, and filtered ports on a target system.
Nmap Scripting Engine (NSE)Feature in Nmap used to automate network tasks and vulnerability detection.
Nmap Service DetectionTechnique for identifying services and versions running on open ports.
Nmap Vulnerability ScanningFeature for detecting and reporting known vulnerabilities in services and applications.
WiresharkA network protocol analyzer used for packet capturing and analysis.
Wireshark Capture FiltersUsed to restrict the packets captured to specific traffic types or conditions.
Wireshark Color CodingSystem to visually distinguish packet types or traffic patterns during analysis.
Wireshark DecryptionFeature to decrypt SSL/TLS-encrypted traffic for inspection.
Wireshark FiltersUsed to isolate and analyze specific traffic from large packet captures.
Wireshark Protocol AnalysisFeature that helps identify malicious or misconfigured traffic by inspecting protocol details.
Wireshark Remote Traffic CaptureFeature allowing packet capture on a remote interface using protocols like SSH or RPCAP.
ZenmapGUI for Nmap, providing an easier way to conduct scans and visualize results.
Front
Metasploit Payload
Click the card to flip
Back
Code executed on a exploited system, such as reverse or bind shells.
Front
Wireshark Capture Filters
Back
Used to restrict the packets captured to specific traffic types or conditions.
Front
Wireshark Remote Traffic Capture
Back
Feature allowing packet capture on a remote interface using protocols like SSH or RPCAP.
Front
Nmap Port Scanning
Back
Technique to identify open, closed, and filtered ports on a target system.
Front
Burp Intruder
Back
Tool for automating customized attacks on web applications by sending payloads to request parameters.
Front
Burp Suite
Back
A web vulnerability scanner and penetration testing tool used for web application security.
Front
Metasploit Exploit Module
Back
Used to deliver payloads and exploit system vulnerabilities.
Front
Burp Suite Extensions
Back
Add-ons developed to expand Burp Suite’s capabilities using the BApp Store or custom scripting.
Front
Burp Collaborator
Back
Tool for detecting vulnerabilities that require external server interactions, like SSRF or DNS rebinding.
Front
Zenmap
Back
GUI for Nmap, providing an easier way to conduct scans and visualize results.
Front
Burp Scanner
Back
Automated tool for identifying vulnerabilities like SQL injection and XSS in web applications.
Front
Metasploit Framework
Back
Central interface for managing exploits, payloads, and auxiliary modules.
Front
Burp Proxy
Back
Tool used for intercepting, modifying, and analyzing HTTP and HTTPS traffic.
Front
Wireshark Protocol Analysis
Back
Feature that helps identify malicious or misconfigured traffic by inspecting protocol details.
Front
Wireshark Decryption
Back
Feature to decrypt SSL/TLS-encrypted traffic for inspection.
Front
Wireshark
Back
A network protocol analyzer used for packet capturing and analysis.
Front
Metasploit Meterpreter
Back
Post-exploitation tool built into Metasploit for interacting with compromised systems.
Front
Nmap Vulnerability Scanning
Back
Feature for detecting and reporting known vulnerabilities in services and applications.
Front
Nmap
Back
Network scanning tool used for discovering hosts and services on a network.
Front
Metasploit Auxiliary Module
Back
Used for tasks like scanning, fuzzing, and sniffing without payload exploitation.
Front
Metasploit
Back
A penetration testing framework used for discovering, exploiting, and validating system vulnerabilities.
Front
Wireshark Filters
Back
Used to isolate and analyze specific traffic from large packet captures.
Front
Nmap Service Detection
Back
Technique for identifying services and versions running on open ports.
Front
Nmap Scripting Engine (NSE)
Back
Feature in Nmap used to automate network tasks and vulnerability detection.
Front
Burp Repeater
Back
Tool for manually manipulating and testing HTTP requests.
Front
Metasploit Armitage
Back
GUI front-end for Metasploit aimed at streamlined collaboration and visualization for penetration testing.
Front
Nmap OS Detection
Back
Feature that identifies the operating system running on remote hosts.
Front
Wireshark Color Coding
Back
System to visually distinguish packet types or traffic patterns during analysis.
1/28
This deck covers widely used ethical hacking tools such as Nmap, Metasploit, Wireshark, and Burp Suite, along with their applications in different hacking phases.
Share on...
Follow us on...