CEH_ Official Certified Ethical Hacker Review Guide_ Exam 312-50 - Kimberly Graves [96]
ping sweep A scan of a range of IP addresses that shows which IP addresses are in use and which aren't. Ping sweeps may include retrieving the DNS name for each live IP address.
Point-to-Point Protocol (PPP) A protocol used for transporting IP packets over a serial link between the user and ISP.
policy A set of rules and regulations specified by an organization as a basis for behavior, operation, or performance.
port scanning Trying to identify the services running on a system by probing ports and viewing the responses from the system. This technique can be used to find services that indicate a weakness in the computer or network device.
POST An HTTP command used to send text to a web server for processing.
Post Office Protocol 3 (POP3) A standard interface for retrieving mail by an e-mail client program and from an e-mail server.
Pretty Good Privacy (PGP) A software package that provides cryptographic routines for e-mail and file-storage applications.
private key Half of the formula to perform public key cryptography. It's used to create a digital signature and to decrypt data that has been encrypted with the corresponding public key.
probing Investigating or examining thoroughly.
process An entity that is uniquely identifiable as it executes in memory.
protocol A convention or standard that controls and enables communications, connections, and data transfers.
proxy server A system that acts on behalf of other systems. Proxy servers are often focal points of a network and contain firewalls.
public key Half of the formula to perform public key cryptography. Messages that have been encrypted with someone's public key can only be decrypted by the person's private key.
remote access A communication method that allows access to a system or network from a remote location via a telephone line or the Internet.
Request for Comments (RFC) A solicitation for professional discussion on a topic of interest. RFCs are often released when developing standards for protocols, systems, or procedures used by the Internet community.
rootkit A collection of tools utilized by an intruder after gaining access to a computer system. These tools assist the attackers in any number of malicious purposes. Rootkits have been developed for all common operating systems, including Linux, Solaris, and Windows.
script A text file containing ordered commands that a user can perform interactively at the keyboard.
Secure Hash Algorithm (SHA) A cryptographic message digest algorithm, similar to the message digest family of hash functions developed by Ron Rivest.
Secure Shell (SSH) Software that produces a secure logon for Windows and Unix using layer 7 of the OSI model.
Security Accounts Manager (SAM) A database of usernames, passwords, and permissions in the Windows architecture.
security token A small physical device used in multifactor authentication that can store cryptographic keys and /or biometric data for identity verification.
Sendmail An SMTP implementation used in Unix.
Serial Line IP (SLIP) A communications protocol for dial-up access to TCP/IP networks. It's commonly used to gain access to the Internet as well as to provide dial-up access between LANs.
server A computer system in a network that provides services to client applications and/or computers.
Server Message Block (SMB) A protocol for sharing files, printers, serial ports, and communications abstractions such as named pipes and mail slots between computers.
session An active communication between a user and the system or between two computers. It also refers to layer 5 (the session layer) of the OSI model.
sheep dip A stand-alone computer that houses antivirus software and is used under strictly controlled norms to check all media devices before they're connected to a network.
shell A command language interpreter that is an interface between an operating system kernel and a user.
shellcode Assembler code that can interact with the operating system and then exit. Hackers often use shellcode to launch exploits,