PM
CEH V12 TOOLS AND USES EXAM QUESTIONS AND ANSWERS WITH
COMPLETE SOLUTIONS VERIFIED LATEST UPDATE 2026
Terms in this set (158)
is a powerful data visualization and intelligence
tool used for conducting online
investigations and link analysis. It
Maltego helps users gather information
from various sources, analyze
relationships between entities,
and generate visualizations to
uncover insights and patterns.
is a Web Reconnaissance framework with
independent modules, database
interaction, built in convenience
Recon-NG functions, interactive help,
and
command completion, that provides an
environment in which open
source web-based
reconnaissance can be
conducted
tool used for extracting metadata and hidden
FOCA
information from various file types, such as documents
and images, to gather intelligence about organizations.
known as the Open Source Risk Management
Framework, is a structured approach to assess and
1/
16
,6/28/25, 2:03
PM
OSR Framework manage risks associated with open source software
usage in
organizations. It provides a comprehensive methodology
for identifying, evaluating, and mitigating risks
throughout the software development lifecycle.
powerful information gathering tool designed for
reconnaissance and OSINT (Open Source Intelligence)
Recon-Dog purposes. It helps in automating the process of
collecting
information about targets, including domains,
subdomains, IP addresses, email addresses, and
more.
Python-based tool used for automating reconnaissance
and information gathering during penetration testing
BillCipher and ethical hacking engagements. It provides various
modules and functionalities to perform tasks such as
DNS enumeration, subdomain discovery, port
scanning, and data mining.
A Ruby app that crawls websites
to generate word lists that can
cewl be used with password crackers
such as John the Ripper. It is
included with Kali Linux.
Information
gathering/harvesting tool for
metagoofil extracting metadata from public
documents (pdf,doc,xls,ppt,
etc)
A search engine that returns
information about the types of
Censys devices connected to the
Internet.
2/
16
, 6/28/25, 2:03
PM
A network utility designed to
scan a network and create a
nmap map. Frequently used as a
vulnerability scanner.
Command line network scanning and pkt crafting tool
hping2/3 for TCP/IP protocol. Used for network security auditing,
FW testing, advanced traceroute and more...
pg 89
A penetration-testing tool that combines known
Metasploit
scanning techniques and exploits to explore
potentially new types of exploits.
An investigation tool that allows you to
troubleshoot, monitor, discover,
NetScanTools Pro and detect devices on your
network.
A Windows-based GUI version of nmap.
Zenmap
Java based software platform of tools for
performing security testing of
BurpSuite web applications. Used for
Proxy as well.
is a free and open-source software that enables
Tor anonymous communication by routing internet traffic
through a network of volunteer-operated servers to
hide a user's identity and location.
allows you to surf anonymously
on the Internet without
Proxy Switcher disclosing your IP address
hides the attacker's IP and replaces it with a selected
CyberGhost VPN
IP, allowing him or her to surf anonymously and
access blocked or censored content.
short for The Amnesic Incognito Live System, is a
3/
16