5.0 Tools Flashcards

1
Q

FOCA

A

Fingerprinting Organizations with Collected Archives is a OSINT software that finds metadata and hidden information in documents from an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

theHarvester also dns

A

A OSINT is program for gathering subdomains, hosts, employee names, email addresses, PGP key entries, open ports, and service banners from servers * DNS recon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shodan

A

Website search engine for devices that are considered part of the Internet of things

*Accessed through https://www.shodan.io OR CLI: ~ $shodan stats –facets port:100 country:US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Maltego

A

A OSINT commercial software used to visually help connect relationships and automate the querying of data and compare it with other sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recon-ng think cross platform/ framework

A

OSINT cross-platform web reconnaissance framework with a system of modules
*To run > # recon-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Censys

A

A OSINT website search engine used for finding hosts and networks with data about their configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SET

A

Social Engineering Toolkit - collection of tools and scripts, to conduct social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BeEF think posture

A

Browser Exploitation Framework - used to assess the security posture of a target environment using cross-site attack vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nikto

A

A web vulnerability scanner used to assess custom web applications 
*perl nikto.pl -h <IP></IP>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OpenVAS 


A

An Open-Source Vulnerability Scanner - with the ability to assign a risk rating for targeted assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nessus 


A

Used to conduct basic, advanced and compliance vulnerability scans (such as PCI DSS audit) to measure the effectiveness of the system’s security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQLmap

A

open-source web application database scanner that searches for SQL injection vulnerabilities

*syntax # sqlmap -u “http://<ip>/cat.php?<pram></pram></ip>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open SCAP

A

Security Content Automation Protocol - creates a predetermined security baseline (by NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wapiti


A

A web application vulnerability scanner that searches for areas where it can inject data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WPScan

A

WordPress site vulnerability scanner identifies plugins used by the website against a database of known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brakeman think rubies

A

Static code analysis security tool, used to identify vulnerabilities in applications written in Ruby on Rails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ScoutSuite think how ?

A

Used to audit instances and policies created on multi-cloud platforms by collecting data using API calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OWASP ZAP

A

Zed Attack Proxy - free open-source application scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Tcpdump

A

CLI protocol analysis tool that conducts packet sniffing and decoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hping

A

Open-source packet crafting tool used to exploit vulnerable firewalls and IDS/IPS * TCP,UDP,ICMP,RAW-IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Aircrack-ng

A

Open-source wireless exploitation tool kit. Consist of:

*Airomon-NG (monitor wireless frequencies to identify access points and clients) *Airodump-NG - (capture network traffic and save it to a PCAP file) *Aireplay-NG (deauthentication attack by sending spoofed deauth requests to the access point) *Airocrack-NG (conduct protocol and password cracking of wireless encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Kismet

A

An open-source tool that contains a wireless sniffer, a network detector, and IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Wifite 


A

Wireless auditing tool that conducts a site survey to locate rogue and hidden access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

EAPHammer

A

A Python-based toolkit that can steal EAP authentication credentials used in a WPA2-Enterprise network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

mdk4

A

Wireless vulnerability exploitation toolkit that can conduct 10 different types of 802.11 exploitation techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Spooftooph 


A

Automates the spoofing or cloning of a Bluetooth device’s name, class, and address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Reaver

A

A tool that conducts a brute-force attack against Wi-Fi Protected Setup (WPS) PIN

28
Q

WiGLE

A

Wireless Geographic Logging Engine - tool that maps and index known wireless AP (consists of a website and database)

29
Q

Fern think recovery

A

Tests wireless networks by conducting password recovery (through brute force , dictionary attacks, as well as session hijacking, replay, and on-path attacks)

30
Q

Hashcat


A

Modern password and hash cracking tool that supports parallel processing (GPU)

31
Q

Medusa

A

A parallel brute-force tool. Used against network logins to attack services that support remote authentication

32
Q

Hydra 


A

A parallel brute-force tool that attempts passwords from a dictionary that meets the minimum password requirements (supports pw-inspect module)

33
Q

CeWL 


A

Automatically crawls a website to collect words and metadata to generate word lists

34
Q

John the Ripper 


A

A password cracking tool that supports large sets of hashes and dictionary and brute-force attacks

35
Q

Cain

A

Cain and Abel
, a legacy password cracking and hash dumping

36
Q

Mimikatz 


A

A tool that gathers credentials by extracting key elements from the memory *use case: Pass-the-hash, Pass-the-ticket, Golden ticket

37
Q

Patator

A


A multi-purpose brute-force tool (methods: ftp, ssh, smb, vnc, and zip password cracking)

38
Q

DirBuster

A


A brute-force tool to identify unlisted directories and file names that may be accessed on a web application or server

39
Q

W3af

A

Web Application Attack and Audit Framework - used to identify and exploit vulnerabilities

40
Q

Burp Suite


A

Used for raw traffic interception and modification. Use case: automated testing, manual request modification, and passive web application analysis

41
Q

Gobuster


A

Used to identify unlisted resources in a web application

42
Q

CloudBrute

A

Used to find a target’s infrastructure, files, and apps across the top cloud service providers

43
Q

Pacu 


A

Exploitation framework used to assess the security configuration of an AWS account

44
Q

CloudCustodian 


A

Open-source cloud security, governance, and management tool to help admins create policies based on resource types

45
Q

Snow

A

CLI steganography tool that conceals a payload within the whitespace of an ASCII formatted text file

46
Q

Coagula 


A

An image synthesizer tool - used to create a sound file (.wav) from image

47
Q

Sonic Visualiser


A

Open-source application for viewing and analyzing the contents of music audio files

48
Q

TinEye


A

A website that can be used to conduct reverse image searches using image recognition

49
Q

Metagoofil

A

Python-based tool that can search for metadata from public documents located on a target’s website

50
Q

Online SSL Checkers


A

Web application used to test the validity, strength, and security of an SSL or TLS digital certificate

51
Q

OllyDbg


A

Linux debugger used to analyze binary code found in 32-bit Windows applications

52
Q

Immunity Debugger


A

Uses Python scripts and APIs to write exploits, analyze malware, and reverse engineer binary files (*Debugger built for penetration testers ).

53
Q

GDB

A

GNU Debugger is a open-source, cross-platform debugger

54
Q

WinDbg


A

Free debugging tool that is distributed by Microsoft for use in the Windows operating system

55
Q

IDA

A

Interactive Disassembler is a commercial disassembler and cross-platform debugging tool (generates assembly language source code from machine-executable code)

56
Q

Covenant


A

An open-source .NET framework focused on penetration testing that also has a development and debugging component

57
Q

SearchSploit


A

A tool used to find exploits available in the Exploit-DB

*install: https://www.exploit-db.com/searchsploit
*CLI: # searchsploit <target> such as # searchsploit vsftp</target>

58
Q

PowerSploit


A

A collection of PowerShell modules that create an exploitation framework

59
Q

Responder


A

A Kali Linux CLI tool used to poison NetBIOS, LLMNR, and MDNS name resolution requests

60
Q

Impacket Tools

A

An open-source collection of python classes for working with network protocols and the exploitation of Windows systems * Remote Execution, Kerberos, Windows Secrets, MiTM Attacks, WMI, SMB/MSRPC

61
Q

Empire 


A

A C2 framework for common post-exploitation tasks can uses PowerShell or Python depending on the system * common use: lateral movement, escalate privileges, capture data, extract passwords, install persistent backdoors

62
Q

Metasploit 


A

A multi-purpose (computer security /penetration testing) framework that uses modularized attacks to exploit systems

63
Q

mitm6

A

An IPv6 DNS hijacking tool - sets the malicious actor as the DNS server by replying to DHCPv6 messages and redirecting the victim to another malicious host

64
Q

CrackMapExec

A

A post-exploitation tool to identify vulnerabilities in Active Directory environments

65
Q

TruffleHog

A

A Git search tool that crawls through a repository looking for accidental commits