Certified Ethical Hacking Terms Flashcards

Learn about the Certified Ethical Hacking terms with these Flashcards. Learn about different terms, words, and much more with our flashcards made on Certified Ethical Hacking terms. Attempt these Cellular and More Policies/Procedures flashcard quizzes and learn, revise, and practice.

364 cards   |   Total Attempts: 188
  

Related Topics

Cards In This Set

Front Back
Whois Lookup
Whois databases are maintained by Regional Internet Registries and contain the personal information of domain owners.
Traceroute Analysis
Attackers conduct traceroute to extract information about: network topology, trusted routes and firewall locations.
Google Hacking Techniques
A term that refers to the art of crearting complex search engine queries. It detects websites that are vulnerable to numerous exploits and vulnerabilities. It uses Google operators to locate specific strings of text within the search results
[cache:]
Shows the version of the web page that Google has cached
[link:]
Lists web pages that have links to the specified web page
[related:]
Lists web pages that are "similar" to specified web page
[info:]
Will present some information that Google has about that web page
[site:]
Google restricts the results to websites in the given domain
[allintitle:]
Google restricts the results to those with all of the query words in the title
[intitle:]
Google restricts the results to documents containing the words in the title
[allinurl:]
Google restricts the results to those with all of the query words in the url
[inurl:]
Google restricts the results to documents containing that word in the url
SYN (Synchronize)
Used to initiate a connect beween hosts
ACK (Acknowledgement)
Used to aknowledge the receipt of a packet
PSH (Push)
Used to instruct the sending system to send all buffered data immediately