Chapter 2 CEH Crossword Puzzle
Across
- 3. Tool used to enumerate subdomains of target
- 6. Service that notifies users of new matching content
- 8. Tool that maps relationships between people and infrastructure
- 10. IP header field limiting router hops
- 12. Database service used to obtain domain registration information
- 13. Top level domain representing highest domain level
- 17. Tool used to collect emails and OSINT data
- 18. Browser used to access anonymous darknet content
- 19. Trick users into revealing confidential information
- 22. Monitoring email opens using timestamped records
- 25. Search Engine Results Pages returned after a query
- 28. Google operator that restricts results to a specific domain
- 29. Protocol used to retrieve domain registration information
- 30. Tool used to discover subdomains and server details
- 31. Tool used for DNS enumeration and reverse lookups
- 33. Method of finding a domain from an IP address
- 36. Registry providing IP allocation and network range data
- 37. Search engine used to discover exposed Internet-connected devices
- 40. Google operator that searches for terms in page titles
- 41. Technique used to trace path between networks
- 42. Utility that traces packet path across routers
- 43. Process of identifying location using an IP address
- 45. DNS reconnaissance tool for subdomain scanning
- 46. Business profile site containing company information
Down
- 1. DNS record mapping IP address to hostname
- 2. Tool used to track most shared social content
- 4. Secondary domain used for departments or testing
- 5. Tool used to view satellite imagery and target locations
- 7. Tool used to determine geographical IP details
- 9. First step in ethical hacking that collects organizational details
- 11. Tool that graphs traceroute latency and packet loss
- 14. Domain research tool for discovering related hosts
- 15. Steps used to prevent information disclosure
- 16. Internet Wayback Machine storing historical website data
- 20. Protocol used by default Windows traceroute
- 21. Process of gathering DNS server and record information
- 23. Regional registry managing Internet number resources
- 24. Security profile obtained after completing footprinting
- 26. Hidden online layer accessed through specialized tools
- 27. Technique used to identify target operating system
- 32. DNS enumeration tool mapping domain records
- 34. Use of advanced search operators to uncover sensitive information
- 35. Preparatory phase of gathering target information before an attack
- 38. People search service providing personal information
- 39. Tool used to search usernames across social networks
- 44. Process used to monitor and manage online reputation