CEH

1234567891011121314151617181920
Across
  1. 1. IP (blank) scanning- A Port scanning technique which splits TCP header into several packets so packet filters can't detect packet intention.
  2. 3. (Blank)Tables is a tool that already has the LM hashes computed for all possible permutations of the administrator.
  3. 5. Visiting Archive.com to retrieve the internet archive of a company website is a good tool in the (blank) stage.
  4. 7. Cross Site (Blank) is a vulnerability that can be detected in a web application.
  5. 8. (blank) scanners attempt to identify vulnerabilities in the hosts scanned.
  6. 11. A hacker will try to cover their (blank).
  7. 13. Weakest(blank) are often untrained staff or ignorant computer users.
  8. 15. From an outside IP, a XMAS scan using Nmap was done and no port illicit a response because they are (blank).
  9. 16. FIN in TCP flag is used to close a (blank).
  10. 18. Has a trunk
  11. 19. (blank) hacker leaves behind viruses, trojans, etc. without regard for consequences.
Down
  1. 2. Jason befriends Jake and follows him into swipe card access area with a deception.
  2. 4. Flying mammal
  3. 5. OS (blank) - Method used to determine the Operating system and version running on a remote target system. is
  4. 6. (blank) 445 uses SMP over TCP/IP.
  5. 9. A (blank) horse is an unauthorized program which performs functions unknown by the user.
  6. 10. Create rules in IDS to alert on strange (blank) requests to protect from an attack on a web server using unobstructed URL.
  7. 12. Large marsupial
  8. 14. Block port 110 to block all (blank)
  9. 16. No way to completely block (blank) into DMZ in publicly accessible areas of network.
  10. 17. Likes to chase mice
  11. 20. Man's best friend