🔥 40% Off Crucial Exams Memberships — Deal ends today!

3 hours, 33 minutes remaining!
Bash, the Crucial Exams Chat Bot
AI Bot

Vulnerabilities and Exploits (CEH)  Flashcards

Certified Ethical Hacker (CEH) Flashcards

Malicious software or hardware used to capture and record a victim's keystrokes.
Security issues introduced by using outdated or flawed third-party code libraries.
SQL Injection
An attack where malicious SQL statements are inserted into a query to manipulate or access the database.
A vulnerability that allows attackers to remotely execute malicious code on a system.
A flaw where unsecured APIs expose sensitive data or functions to unauthorized users.
Remote Code Execution (RCE)
Phishing
Unsecured APIs
Keylogger
An exploit that tricks users into providing sensitive information via fake emails or websites.
Vulnerable Third-Party Libraries
FrontBack
ARP SpoofingAn attack that sends fake ARP messages to associate a malicious MAC address with a legitimate IP address.
Broken AuthenticationA vulnerability in which authentication functions allow attackers to compromise account data or sessions.
Brute Force AttackAn attack method that involves systematically guessing passwords or keys.
Buffer OverflowAn exploit where attackers overwrite memory locations to execute malicious code.
ClickjackingAn attack that tricks users into clicking on an element disguised as something else.
Command InjectionAn exploit that allows attackers to execute arbitrary commands on a host operating system.
Credential ReuseA vulnerability where users' reused credentials are exploited across multiple services.
Cross-Site Request Forgery (CSRF)An exploit that tricks users into performing actions without their intent on authenticated websites.
Cross-Site Scripting (XSS)A vulnerability allowing attackers to inject malicious scripts into web applications viewed by other users.
Denial of Service (DoS)An attack designed to make a system or network unavailable to its intended users.
Directory TraversalA method of accessing files or directories outside of the intended directory scope.
Distributed Denial of Service (DDoS)An attack where multiple compromised systems target a single system to overload it and cause disruption.
DNS SpoofingA technique where DNS responses are manipulated, redirecting victims to malicious sites.
Exploit KitsPrepackaged software used by hackers to exploit known vulnerabilities.
Insecure DeserializationA vulnerability where untrusted data is used to manipulate or exploit application logic.
KeyloggerMalicious software or hardware used to capture and record a victim's keystrokes.
Malware InjectionAn attack where malicious software is introduced into a system or application.
Man-in-the-Middle (MITM)An attack where an attacker intercepts and potentially alters communication between two parties.
Password SprayingA variation of brute force attacks that uses one password on many accounts instead of many passwords on one account.
PhishingAn exploit that tricks users into providing sensitive information via fake emails or websites.
PivotingAn exploitation technique where an attacker uses a compromised system to attack additional systems in a network.
Privilege EscalationA method of gaining higher-level permissions on a system or network.
Remote Code Execution (RCE)A vulnerability that allows attackers to remotely execute malicious code on a system.
Rogue Access PointAn unauthorized wireless access point installed in a network to exploit Wi-Fi security gaps.
Session HijackingAn attack where an active session is taken over without the user's consent.
Social EngineeringThe use of deception to manipulate individuals into divulging confidential information.
SQL InjectionAn attack where malicious SQL statements are inserted into a query to manipulate or access the database.
Unsecured APIsA flaw where unsecured APIs expose sensitive data or functions to unauthorized users.
Vulnerable Third-Party LibrariesSecurity issues introduced by using outdated or flawed third-party code libraries.
Zero-Day VulnerabilityA vulnerability unknown to the vendor and potentially exploited before a fix is released.
Front
Keylogger
Click the card to flip
Back
Malicious software or hardware used to capture and record a victim's keystrokes.
Front
Directory Traversal
Back
A method of accessing files or directories outside of the intended directory scope.
Front
Insecure Deserialization
Back
A vulnerability where untrusted data is used to manipulate or exploit application logic.
Front
Unsecured APIs
Back
A flaw where unsecured APIs expose sensitive data or functions to unauthorized users.
Front
Buffer Overflow
Back
An exploit where attackers overwrite memory locations to execute malicious code.
Front
Command Injection
Back
An exploit that allows attackers to execute arbitrary commands on a host operating system.
Front
Social Engineering
Back
The use of deception to manipulate individuals into divulging confidential information.
Front
Man-in-the-Middle (MITM)
Back
An attack where an attacker intercepts and potentially alters communication between two parties.
Front
Distributed Denial of Service (DDoS)
Back
An attack where multiple compromised systems target a single system to overload it and cause disruption.
Front
Broken Authentication
Back
A vulnerability in which authentication functions allow attackers to compromise account data or sessions.
Front
Credential Reuse
Back
A vulnerability where users' reused credentials are exploited across multiple services.
Front
Zero-Day Vulnerability
Back
A vulnerability unknown to the vendor and potentially exploited before a fix is released.
Front
Cross-Site Request Forgery (CSRF)
Back
An exploit that tricks users into performing actions without their intent on authenticated websites.
Front
Vulnerable Third-Party Libraries
Back
Security issues introduced by using outdated or flawed third-party code libraries.
Front
Remote Code Execution (RCE)
Back
A vulnerability that allows attackers to remotely execute malicious code on a system.
Front
Session Hijacking
Back
An attack where an active session is taken over without the user's consent.
Front
Pivoting
Back
An exploitation technique where an attacker uses a compromised system to attack additional systems in a network.
Front
DNS Spoofing
Back
A technique where DNS responses are manipulated, redirecting victims to malicious sites.
Front
Rogue Access Point
Back
An unauthorized wireless access point installed in a network to exploit Wi-Fi security gaps.
Front
Password Spraying
Back
A variation of brute force attacks that uses one password on many accounts instead of many passwords on one account.
Front
Denial of Service (DoS)
Back
An attack designed to make a system or network unavailable to its intended users.
Front
Cross-Site Scripting (XSS)
Back
A vulnerability allowing attackers to inject malicious scripts into web applications viewed by other users.
Front
Brute Force Attack
Back
An attack method that involves systematically guessing passwords or keys.
Front
ARP Spoofing
Back
An attack that sends fake ARP messages to associate a malicious MAC address with a legitimate IP address.
Front
Clickjacking
Back
An attack that tricks users into clicking on an element disguised as something else.
Front
Exploit Kits
Back
Prepackaged software used by hackers to exploit known vulnerabilities.
Front
Privilege Escalation
Back
A method of gaining higher-level permissions on a system or network.
Front
Phishing
Back
An exploit that tricks users into providing sensitive information via fake emails or websites.
Front
SQL Injection
Back
An attack where malicious SQL statements are inserted into a query to manipulate or access the database.
Front
Malware Injection
Back
An attack where malicious software is introduced into a system or application.
1/30
This deck highlights key vulnerabilities in systems, applications, and networks, along with examples of exploits used by ethical hackers in penetration testing.
Share on...
Follow us on...