CEH
Across
- 1. IP (blank) scanning- A Port scanning technique which splits TCP header into several packets so packet filters can't detect packet intention.
- 3. (Blank)Tables is a tool that already has the LM hashes computed for all possible permutations of the administrator.
- 5. Visiting Archive.com to retrieve the internet archive of a company website is a good tool in the (blank) stage.
- 7. Cross Site (Blank) is a vulnerability that can be detected in a web application.
- 8. (blank) scanners attempt to identify vulnerabilities in the hosts scanned.
- 11. A hacker will try to cover their (blank).
- 13. Weakest(blank) are often untrained staff or ignorant computer users.
- 15. From an outside IP, a XMAS scan using Nmap was done and no port illicit a response because they are (blank).
- 16. FIN in TCP flag is used to close a (blank).
- 18. Has a trunk
- 19. (blank) hacker leaves behind viruses, trojans, etc. without regard for consequences.
Down
- 2. Jason befriends Jake and follows him into swipe card access area with a deception.
- 4. Flying mammal
- 5. OS (blank) - Method used to determine the Operating system and version running on a remote target system. is
- 6. (blank) 445 uses SMP over TCP/IP.
- 9. A (blank) horse is an unauthorized program which performs functions unknown by the user.
- 10. Create rules in IDS to alert on strange (blank) requests to protect from an attack on a web server using unobstructed URL.
- 12. Large marsupial
- 14. Block port 110 to block all (blank)
- 16. No way to completely block (blank) into DMZ in publicly accessible areas of network.
- 17. Likes to chase mice
- 20. Man's best friend