Sybex - Tools Flashcards

Be able to state the purpose and use case for all of the tools in this list (70 cards)

1
Q

WHOIS

A

OSINT: gather info from public records about domain ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nslookup

A

OSINT: Help identify IP address associated with an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

theHarvester

A

OSINT: Scours search engines and other sources to find email addresses, employee names, and infrastructure details about an org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Recon-ng

A

OSINT: Modular web reconnaissance framework that organizes and manages OSINT work. (Need more info on this)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Censys

A

OSINT: web-based tool that probes IP addresses across the internet then provides pen testers with access to that info through a search engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FOCA

A

OSINT: Fingerprinting Organizations with Collective Archives; Find Metadata in Office Documents, PDFs, and other common file formats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Shodan

A

OSINT: Specialized Search Engine for discovery of vulnerable IoT devices from public sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Maltego

A

OSINT: commercial product that assists with visualization of data gathered via OSINT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NMAP

A

OSINT: Port Scanning and Network Mapping tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Nessus

A

VulnScan: commercial tool used to scan wide variety of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OpenVAS

A

VulnScan: OSS network vuln scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SqlMap

A

VulnScan: automate Sql injection attacks against web apps with database back ends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Nikto, Wapiti, W3AF

A

VulnScan: OSS Web Application vuln scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPScan

A

VulnScan: Web app testing tool designed to work with websites running WordPress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SCAP

A

VulnScan: (Security Content Automation Protocol) Set of tools designed to help orgs manage compliance and security standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SET

A

SocialEngineer: (Social Engineering Toolkit) Framework for automating the social engineering process; sending spearphishing emails, hosting fake websites, collecting credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BeEF

A

SocialEngineer: (Browser Exploitation Framework) automated toolkit for using social engineering to take over a victim’s web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hashcat

A

CredentialTest: password cracking and reverse-engineer hashed password tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

John the Ripper

A

CredentialTest: password cracking and reverse-engineer hashed password tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hydra

A

CredentialTest: password cracking and reverse-engineer hashed password tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Medusa

A

CredentialTest: password cracking and reverse-engineer hashed password tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Patator

A

CredentialTest: password cracking and reverse-engineer hashed password tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cain

A

CredentialTest: password cracking and reverse-engineer hashed password tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CeWL

A

CredentialTest: custom wordlist generator that searched websites for keywords that may be used in password-guessing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Mimikatz
CredentialTest: Retrieve creds from memory on Windows machines
26
DirBuster
CredentialTest: brute-forcing tool to enumerate files and directories on web server
27
Immunity Debugger
Debugger/SoftwareTest: supports pentesting and reverse engineering malware
28
GDB
Debugger/SoftwareTest: OSS debugger for Linux for use with many programming languages
29
OllyDbg
Debugger/SoftwareTest:Windows debugger that works on binary code at the assembly language level
30
WinDbg
Debugger/SoftwareTest:Windows Specific debug tool created by Microsoft
31
IDA
Debugger/SoftwareTest:commercial debugging tool for use on Windows/Mac/Linux
32
Brakeman
Debugger/SoftwareTest:static software analysis tool for scanning Ruby on Rails apps
33
Covenant
Debugger/SoftwareTest:software security testing tool for testing .NET apps
34
TruffleHog
Debugger/SoftwareTest: scans through code repos for accidentally published secrets
35
Wireshark
Network Testing: protocol analyzer, eavesdrop on network traffic
36
Hping
Network Testing: command line tool to artificially generate network traffic
37
Aircrack-ng
Network Testing: wireless network security testing tool
38
WiFite
Network Testing: wireless network security testing tool
39
mdk4
Network Testing: wireless network security testing tool
40
Fern
Network Testing: wireless network security testing toolK
41
Kismet
Network Testing: wireless network security testing tool
42
Rogue Wireless Access points
Network Testing: used to attract connections from people
43
EAPHammer
Network Testing: used to conduct evil twin attacks against WPA2-Enterprise wireless networks
44
Reaver
Network Testing: conduct attacks against networks that support WPS
45
Spooftooph
Network Testing: bluetooth attacks
46
Wireless Geographic Logging Engine (WiGLE)
Network Testing: open database of wireless network info collected by community and published for open access
47
Online SSL Checkers
Network Testing: determine if websites are susceptible to TLS/SSL vulnerabilities
48
SSH
Remote Access: secure encrypted communication
49
Ncat and Netcat
Remote Access: easy way to read and write data over network connections
50
ProxyChains
Remote Access: allows testers to force connections through a proxy server where they may be inspected and altered before being passed onto final destination
51
Metasploit
Exploitations: most popular exploitation framework that supports thousands of plug-ins
52
SearchSploit
Exploitations: command-line tool to search through db of known exploits
53
PowerSploit
Windows-centric sets of Powershell Scripts to automate penetration testing tasksWindows-centric sets of Powershell Scripts to automate penetration testing tasks
54
Empire
Exploitations:Windows-centric sets of Powershell Scripts to automate penetration testing tasks
55
Responder
Exploitations: toolkit used to answer NetBIOS queries from Windows Systems
56
Impacket
Exploitations: set of network tools that provide low-level access to network protocols
57
Mitm6
Exploitations: tool used to conduct attacks against IPv6 networks
58
CrackMapExec
Exploitations: set of tools to evaluate AD environment after gaining network access
59
OpenSteg
Steganography: general purpose tool to hide text within images and other binary files
60
Steghide
Steganography: general purpose tool to hide text within images and other binary files
61
Coagula
Steganography: used to embed text within audio files
62
Sonic Visualizer
Steganography: audio analysis tool to detect alterations that may have been made by steganography tools
63
Snow
Steganography: Uses white space and tabs in a document to hide information
64
TinEye
Steganography: reverse image search tool that allows researchers to identify the original image when they suspect steg is being used
65
Metagoofil
Steganography: extract metadata from a large variety of file types
66
ScoutSuite
CloudTools: Cloud Security and Auditing tool
67
CloudBrute
CloudTools: scanner used to identify cloud components used by organizations
68
Pacu
CloudTools: cloud exploitation framework used specifically for AWS environments
69
Cloud Custodian
CloudTools: rule enforcement engine to ensure consistent application of security rules across environments
70
ExifTool
OSINT: easily see metadata on a file