Chapter 2 CEH Crossword Puzzle

12345678910111213141516171819202122232425262728293031323334353637383940414243444546
Across
  1. 3. Tool used to enumerate subdomains of target
  2. 6. Service that notifies users of new matching content
  3. 8. Tool that maps relationships between people and infrastructure
  4. 10. IP header field limiting router hops
  5. 12. Database service used to obtain domain registration information
  6. 13. Top level domain representing highest domain level
  7. 17. Tool used to collect emails and OSINT data
  8. 18. Browser used to access anonymous darknet content
  9. 19. Trick users into revealing confidential information
  10. 22. Monitoring email opens using timestamped records
  11. 25. Search Engine Results Pages returned after a query
  12. 28. Google operator that restricts results to a specific domain
  13. 29. Protocol used to retrieve domain registration information
  14. 30. Tool used to discover subdomains and server details
  15. 31. Tool used for DNS enumeration and reverse lookups
  16. 33. Method of finding a domain from an IP address
  17. 36. Registry providing IP allocation and network range data
  18. 37. Search engine used to discover exposed Internet-connected devices
  19. 40. Google operator that searches for terms in page titles
  20. 41. Technique used to trace path between networks
  21. 42. Utility that traces packet path across routers
  22. 43. Process of identifying location using an IP address
  23. 45. DNS reconnaissance tool for subdomain scanning
  24. 46. Business profile site containing company information
Down
  1. 1. DNS record mapping IP address to hostname
  2. 2. Tool used to track most shared social content
  3. 4. Secondary domain used for departments or testing
  4. 5. Tool used to view satellite imagery and target locations
  5. 7. Tool used to determine geographical IP details
  6. 9. First step in ethical hacking that collects organizational details
  7. 11. Tool that graphs traceroute latency and packet loss
  8. 14. Domain research tool for discovering related hosts
  9. 15. Steps used to prevent information disclosure
  10. 16. Internet Wayback Machine storing historical website data
  11. 20. Protocol used by default Windows traceroute
  12. 21. Process of gathering DNS server and record information
  13. 23. Regional registry managing Internet number resources
  14. 24. Security profile obtained after completing footprinting
  15. 26. Hidden online layer accessed through specialized tools
  16. 27. Technique used to identify target operating system
  17. 32. DNS enumeration tool mapping domain records
  18. 34. Use of advanced search operators to uncover sensitive information
  19. 35. Preparatory phase of gathering target information before an attack
  20. 38. People search service providing personal information
  21. 39. Tool used to search usernames across social networks
  22. 44. Process used to monitor and manage online reputation