Bash, the Crucial Exams Chat Bot
AI Bot

Vulnerabilities and Exploits (CEH)  Flashcards

Certified Ethical Hacker (CEH) Flashcards

FrontBack
ARP SpoofingAn attack that sends fake ARP messages to associate a malicious MAC address with a legitimate IP address.
Broken AuthenticationA vulnerability in which authentication functions allow attackers to compromise account data or sessions.
Brute Force AttackAn attack method that involves systematically guessing passwords or keys.
Buffer OverflowAn exploit where attackers overwrite memory locations to execute malicious code.
ClickjackingAn attack that tricks users into clicking on an element disguised as something else.
Command InjectionAn exploit that allows attackers to execute arbitrary commands on a host operating system.
Credential ReuseA vulnerability where users' reused credentials are exploited across multiple services.
Cross-Site Request Forgery (CSRF)An exploit that tricks users into performing actions without their intent on authenticated websites.
Cross-Site Scripting (XSS)A vulnerability allowing attackers to inject malicious scripts into web applications viewed by other users.
Denial of Service (DoS)An attack designed to make a system or network unavailable to its intended users.
Directory TraversalA method of accessing files or directories outside of the intended directory scope.
Distributed Denial of Service (DDoS)An attack where multiple compromised systems target a single system to overload it and cause disruption.
DNS SpoofingA technique where DNS responses are manipulated, redirecting victims to malicious sites.
Exploit KitsPrepackaged software used by hackers to exploit known vulnerabilities.
Insecure DeserializationA vulnerability where untrusted data is used to manipulate or exploit application logic.
KeyloggerMalicious software or hardware used to capture and record a victim's keystrokes.
Malware InjectionAn attack where malicious software is introduced into a system or application.
Man-in-the-Middle (MITM)An attack where an attacker intercepts and potentially alters communication between two parties.
Password SprayingA variation of brute force attacks that uses one password on many accounts instead of many passwords on one account.
PhishingAn exploit that tricks users into providing sensitive information via fake emails or websites.
PivotingAn exploitation technique where an attacker uses a compromised system to attack additional systems in a network.
Privilege EscalationA method of gaining higher-level permissions on a system or network.
Remote Code Execution (RCE)A vulnerability that allows attackers to remotely execute malicious code on a system.
Rogue Access PointAn unauthorized wireless access point installed in a network to exploit Wi-Fi security gaps.
Session HijackingAn attack where an active session is taken over without the user's consent.
Social EngineeringThe use of deception to manipulate individuals into divulging confidential information.
SQL InjectionAn attack where malicious SQL statements are inserted into a query to manipulate or access the database.
Unsecured APIsA flaw where unsecured APIs expose sensitive data or functions to unauthorized users.
Vulnerable Third-Party LibrariesSecurity issues introduced by using outdated or flawed third-party code libraries.
Zero-Day VulnerabilityA vulnerability unknown to the vendor and potentially exploited before a fix is released.
This deck highlights key vulnerabilities in systems, applications, and networks, along with examples of exploits used by ethical hackers in penetration testing.
Share on...
Follow us on...