100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CEH v12 tools and uses questions and answers $11.99   Add to cart

Exam (elaborations)

CEH v12 tools and uses questions and answers

 7 views  0 purchase
  • Course
  • CEH v12
  • Institution
  • CEH V12

CEH v12 tools and uses questions and answers

Preview 3 out of 17  pages

  • August 9, 2024
  • 17
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CEH v12
  • CEH v12
avatar-seller
millyphilip
CEH v12 tools and uses questions and
answers
Maltego
is a powerful data visualization and intelligence tool used for conducting online
investigations and link analysis. It helps users gather information from various sources,
analyze relationships between entities, and generate visualizations to uncover insights
and patterns.




Recon-NG
is a Web Reconnaissance framework with independent modules, database interaction,
built in convenience functions, interactive help, and command completion, that provides
an environment in which open source web-based reconnaissance can be conducted




Read More
FOCA
tool used for extracting metadata and hidden information from various file types, such
as documents and images, to gather intelligence about organizations.
OSR Framework
known as the Open Source Risk Management Framework, is a structured approach to
assess and manage risks associated with open source software usage in organizations.
It provides a comprehensive methodology for identifying, evaluating, and mitigating risks
throughout the software development lifecycle.
Recon-Dog
powerful information gathering tool designed for reconnaissance and OSINT (Open
Source Intelligence) purposes. It helps in automating the process of collecting
information about targets, including domains, subdomains, IP addresses, email
addresses, and more.
BillCipher

,Python-based tool used for automating reconnaissance and information gathering
during penetration testing and ethical hacking engagements. It provides various
modules and functionalities to perform tasks such as DNS enumeration, subdomain
discovery, port scanning, and data mining.
cewl
A Ruby app that crawls websites to generate word lists that can be used with password
crackers such as John the Ripper. It is included with Kali Linux.




metagoofil
Information gathering/harvesting tool for extracting metadata from public documents
(pdf,doc,xls,ppt, etc)




Censys
A search engine that returns information about the types of devices connected to the
Internet.




nmap
A network utility designed to scan a network and create a map. Frequently used as a
vulnerability scanner.




hping2/3
Command line network scanning and pkt crafting tool for TCP/IP protocol. Used for
network security auditing, FW testing, advanced traceroute and more...
pg 89
Metasploit
A penetration-testing tool that combines known scanning techniques and exploits to
explore potentially new types of exploits.
NetScanTools Pro

, An investigation tool that allows you to troubleshoot, monitor, discover, and detect
devices on your network.




Zenmap
A Windows-based GUI version of nmap.




BurpSuite
Java based software platform of tools for performing security testing of web
applications. Used for Proxy as well.




Tor
is a free and open-source software that enables anonymous communication by routing
internet traffic through a network of volunteer-operated servers to hide a user's identity
and location.
Proxy Switcher
allows you to surf anonymously on the Internet without disclosing your IP address




CyberGhost VPN
hides the attacker's IP and replaces it with a selected IP, allowing him or her to surf
anonymously and access blocked or censored content.
Tails
short for The Amnesic Incognito Live System, is a privacy-focused operating system
that aims to preserve anonymity and security while using computers. It includes various
built-in security tools and features, such as Tor integration, encryption, and data wiping.
Whonix
a desktop OS designed for advanced security and privacy. It mitigates the threat of
common attack vectors while maintaining usability.
SNMP

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller millyphilip. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.99
  • (0)
  Add to cart