FC 101-125.txt

Card Set Information

Author:
Sanford111
ID:
44228
Filename:
FC 101-125.txt
Updated:
2010-10-22 15:29:53
Tags:
CEH
Folders:

Description:
CEH 5
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Sanford111 on FreezingBlue Flashcards. What would you like to do?


  1. Footprinting Tools:
    NeoTrace (Visual Tracerouting software)
  2. Port Scanners (5):
    Nmap
  3. Sniffers(4):
    TCPDump
  4. Man-In-The-Middle Attack Tools(5):
    Ettercap
  5. Password Crackers(3):
    John The Ripper
  6. Enumeration Tool(6):
    User2sid
  7. Network Monitoring(3):
    Cheops
  8. DDOS Tools(5):
    Trinoo
  9. Steganography Tools(3):
    Snow
  10. Trojans(3):
    RAT (Remote Access Trojan)
  11. Vulnerability Scanners(3):
    Nessus
  12. LAND Attack:
    Spoofed packets with destination IP as the source
  13. Smurf Attack:
    ICMP packets to the network broadcast address
  14. Fraggle Attack:
    Simple UDP echo based re-write of the smurf attack using spoofed source IPs.
  15. Ping of Death:
    IP packets with IP Header size of 65
  16. Tear Drop:
    The bug causes the TCP/IP fragmentation re-assembly code to improperly handle overlapping IP fragments.
  17. ICMP Type 0
    Echo Reply
  18. ICMP Type 3
    Destination Unreachable
  19. ICMP Type 3: Code 13
    Administratively Prohibited
  20. ICMP Type 8
    Echo
  21. ICMP Type 11
    Time Exceeded
  22. ICMP Type 11: Code 0
    Time Exceeded (RFC 792)
  23. ICMP Type 11: Code 1
    Fragment Reassembly Time Exceeded
  24. ICMP Type 13
    Timestamp
  25. ICMP Type 14
    Timestamp Reply

What would you like to do?

Home > Flashcards > Print Preview