Tools Flashcards

(60 cards)

1
Q

WHOIS

A

a query and response protocol used for querying databases that store registered users or assignees of an internet resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nslookup

A

Command-line tool for querying DNS to obtain mapping between domain names and IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fingerprinting Organizations with Collected Archives (FOCA)

A

Used to find metadata and hidden information in collected documents from an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

theHarvester

A

Program for gathering emails, subdomains, hosts, employee names, PGP key entries, open ports and service banners from servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shodan

A

Website search engine for web cameras, routers, servers and other devices that considered part of the Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maltego

A

Commercial software for conducting OSINT that visually helps connect those relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Recon-ng

A

Cross platform web reconnaissance framework that uses a system of modules to add additional features and functions for your use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Censys

A

Website search engine used for finding hosts and networks across the internet with data and their configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nikto

A

Web vulnerability scanner that is used to assess custom web applications that a company may have coded themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OpenVAS

A

Open source vulnerability scanner that is used to identify vulnerabilities and assign a risk rating for those targeted assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nessus

A

A proprietary vulnerability scanner that is used to conduct basic, advanced and compliance vulnerability scans to measure the effectiveness of the systems security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQLmap

A

An open-source database scanner that searches for SQL injection vulnerabilities that can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open SCAP (Security Content Automation Protocol)

A

A tool created by NIST that is used to create a predetermined security baseline to determine vulnerabilities or deviations in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wapiti

A

Web Application vulnerability scanner which will automatically navigate a web app looking for areas where it can inject data to target different vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WPScan

A

A WordPress site vulnerability scanner that identifies the plugins used by the website against a database of known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brakeman

A

Static code analysis security tool that is used to identify vulnerabilities in applications written in Ruby on Rails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ScoutSuite

A

Open-source tool written in Python that can be used to audit instances and policies created on multicloud platforms by collecting data using API calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Wireshark

A

An open-source protocol analysis tool that can conduct packet sniffing, decoding, and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Tcpdump

A

A command-line protocol analysis tool that cna conduct packet sniffing, decoding, and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hping

A

An open-source packet crafting tool used to exploit vulnerable firewalls and IDS/IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Aircrack-ng

A

Open-source wireless exploitation tool kit consisting of airomon-ng, airodump-ng, aireplay-ng, and airocrack-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Airomon-NG

A

User to monitor wireless frequencies to identify access points and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Airodump-NG

A

Used to capture network traffic and save it to a PCAP file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Airocrack-NG

A

Used to conduct protocol and password cracking of wireless encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Kismet
Open-source tool that contains a wireless sniffer, network detector, and IDS
26
Wifite
Wireless auditing tool that can be used to conduct a site survey to locate rogue and hidden access points
27
EAPHammer
Python-based toolkit that can be used to steal EAP authentication credentials used in a WPA2-Enterprise network
28
mdk4
Wireless vulnerability exploitation toolkit that can conduct 10 different types of 802.11 exploitation techniques
29
Spooftooph
Automates the spoofing or cloning of a Bluetooth device's name, class, and address.
30
Reaver
A tool that conducts a brute-force attack against an access point's Wi-Fi Protected Setup (WPS) PIN to recover the WPA PSK
31
Wireless Geographic Logging Engine (WiGLE)
Wireless OSINT tool that consists of a website and database dedicated to mapping and indexing all known wireless access points
32
Fern
Tests wireless networks by conducting password recovery through brute force and dictionary attacks, as well as session hijacking, replay and on-path attacks
33
Social Engineering Toolkit (SET)
Python-based collection of tools and scripts that are used to conduct social engineering during a penetration test
34
Browser Exploitation Framework (BeEF)
Used to assess the security posture of a target environment using cross-site attack vectors
35
Netcat (nc)
Command-line utility used to read from or write to TCP, UDP, or Unix domain socket network connections
36
Ncat
Improved version of Netcat which can also act as a proxy, launch executable, transfer files, and encrypt all communications to and from the victim machine
37
ProxyChains
Command-line tool that enables pen testers to mask their identity and/or source IP address by sending messages through proxy servers or intermediaries
38
Hashcat
Modern password and hash cracking tool that supports the use of GPUs for parallel processing when conducting dictionary, brute force, and hybrid attacks
39
Medusa
Parallel brute-force tool that is used against network logins to attack services that support remote authentication
40
Hydra
Parallel brute-force tool that also supports a pw-inspect module to only attempt passwords from a dictionary that meets the minimum password requirements for a given system
41
CeWL
Used to generate word lists based on the automatic crawling of a website to collect words and metadata from the site
42
John the Ripper
A password cracking tool that supports large sets of hashes and dictionary and brute-force attacks
43
Cain
Legacy password cracking and hash dumping tool that can conduct network sniffing to identify hashes that may be vulnerable to cracking
44
Patator
Multipurpose brute-force tool that supports several different methods, including ftp, ssh,smb,vnc, and zip password cracking
44
Mimikatz
Tool that gathers credentials by extracting key elements from the memory of a system such as clear text passwords, hashes, and PIN codes
45
DirBuster
Brute-force tool run against a web application or server to identify unlisted directories and file names that maybe accessed
46
Web Application Attack and Audit Framework (w3af)
Tool used to identify and exploit a large set of web-based vulnerabilites, such as SQL injection and cross-site scripting
47
OWASP ZAP (Zed Attack Proxy)
Open-source web application security scanner and attack proxy used in automated and manual testing and identification of web application vulnerabilities
48
Burp Suite
Used in raw traffic interception inspection, and modification during automated testing, manual request modification and passive web application analysis
49
Gobuster
Brute-force dictionary, file, and DNS identification tool used to identify unlisted resources in a web application
50
CloudBrute
Used to find a target's infrastructure, files, and apps across the top cloud service providers, including Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, and Linode
51
Pacu
Exploitation framework used to assess the security configuration of an Amazon Web Services (AWS) account
52
Cloud Custodian
Open-Source cloud security, governance, and management tool designed to help admins create policies based on different resource types.
53
OpenStego
Free steganography solution to conduct data hiding within a file and watermarking of files with invisible signatures to detect unauthorized file copying
54
Steghide
Open-source stenography tool used to conceal a payload by compressing, concealing and encrypting its data in an image or audio file
55
Snow
command-line steganography tool that conceals a payload withing the whitespace of ans ASCII formatted text file in plaintext or encrypted format
56
Coagula
Image synthesizer tool that can be used to create a sound file from a given image
57
Sonic Visualizer
An open-source application for viewing and analyzing the contents of music audio files
58
Metagoofil
Python-based tool that can search for metadata from public documents located on a target's website
59