Pentest Tools Flashcards

(60 cards)

1
Q

OpenVAS

A

vulnerability scanner
assigns risk rating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nessus

A

commercial vuln scanner
assigns risk rating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

W3AF

A

web app attack and audit framework
identifies and exploits large set of web based vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

mimikatz

A

gathers credentials by extracting elements from system such as cleartext passwords, hashes and pin codes.
common for pass the hash (NTLM relay and kerberos attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

hashcat

A

password and hash cracking tool
one of the fastest pw recovery tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

medusa

A

parallel brute force tool for network logins that support remote login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hydra

A

parallel brute force tool that only attempts passwords from dictionary that meet the minimum pw requirements for that site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CeWL

A

creates custom word list and dictionary by collecting words and metadata from the site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Patator

A

multipurpose brute force tool that supports several different methods of PW cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DirBuster

A

brute force tool to identify unlisted directories and file names that may be accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ollydbg

A

linux debugger to analyze binary on 32 bit windows apps
helpful if you don’t have access to source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IDA

A

interactive disassembler
commercial disassembly and debug tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Immunity debugger

A

debugger built specifically for pen testers to write exploits, analyze malware, and reverse engineer binary files using python scripts and APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AFL

A

american fuzzy lop
fuzzing tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

findsecbugs

A

used to do security audits of java apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

sonarqube

A

performs automatic static code reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

YASCA

A

yet another source code analyzer
software code scanner using plug ins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

censys

A

website search engine for finding hosts and networks across the internet with data about their config. can find cloud services
similar to shodan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

shodan

A

search engine to find IoT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FOCA

A

fingerprinting organizations with collected archives
finds metadata
WINDOWS ONLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

kismet

A

wireless exploitation suite that can scan, sniff, and defend as an IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WiFite

A

wireless auditing tool that can locate rogue and hidden access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Airomon-NG

A

monitor wireless frequencies to identify access points and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Airodump-ng

A

capture network traffic and save to PCAP file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
aireplay-ng
conducts deauthentication attacks by sending spoofed deauth requests to access point
26
airocrack-ng
conducts protocol and PW cracking of wireless encryption
27
OWASP ZAP
web app security scanner and attack proxy for web app vulnerabilities
28
Burp suite
graphical tool for web app scanning
29
BeEF
browser exploitation framework social engineering tool focused on the web browser
30
ncat
CL tool for reading, writing, redirecting, and encrypting data on a network new version of net cat
31
netcat
swiss army knife CL tool for reading, writing, redirecting, and encrypting data on a network
32
proxychains
CL tool that allows you to mask your identity and/or source IP address by sending messages through proxy servers or other intermediaries
33
drozer
complete security audit and attack framework for android
34
powersploit
collection of powershell modules for pentesting, post exploitation
35
searchsploit
tool used to find exploits available in exploit-DB
36
responder
CL tool in Kali used to poison netbios, LLMNR, and MDNS name resolution requests
37
impacket
collection of python classes for working with network protocols and the exploitation of windows systems
38
Route
evasion tool
39
hopper
used for decompilation
40
foremost FTK Encase Tableau
forensics tools
41
bloodhound
explores active directory trust relationships and abuse rights on AD objects
42
metagoofil
search metadata associated with public documents on target's website
43
open SCAP
vuln scanner created by NIST that is used to create a predetermined baseline for finding vulnerabilities and deviations in a system
44
Wapiti
web app vuln scanner that automatically navigates a web app looking for areas to inject data
45
brakeman
static code analysis for ruby on rails
46
tcpdump
conducts packet sniffing, decoding, and analysis
47
EAPHammer
used to steal EAP authentication credentials using WPA2-enterprise network wireless tool
48
mdk4
wireless vuln exploit toolkit that can conduct 10 types of 802.11 exploit techniques
49
reaver
brute force tool for WPS pin to recover wpa psk
50
empire
c2 framework that uses powershell for common post exploit task on windows and python for post exploit tasks on linux easily identifies
51
fern
tests wireless networks by conducting PW recovery through brute force and dictionary attacks as well as hijacking, replay and on path attacks GUI
52
go buster
brute force dictionary, file and DNA id tool to identify unlisted resources on web app
53
openstego
stego tool to hide data in a file and watermark file with invisible signature to detect unauthorized copying
54
steghide
conceals payload into image or audio file
55
sonic visualizer
app for viewing and analyzing contents of music audio files
56
tineye
website used to reverse image searches
57
covenant
.net framework focused on pen testing that also has a development and debugging component also used as a c2 platform
58
mitm6
ipv6 dns hacking tool. replies to DHCPv6 messages and redirects the victim to another malicious host
59
crack map exec
post exploit tool to identify vulnerabilities in AD environments
60
trufflehog
git secrets search tool that crawls through repositories looking for accidental commits of secrets to git repositories.