Tools Flashcards

(15 cards)

1
Q

A command-line utility for copying and converting data, often used for creating forensic images of drives. Disk cloning, data recovery, creating backups

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A utility for capturing the contents of RAM. Analyzing system state at the time of an incident, malware analysis.

A

Memdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Displays network connections, routing tables, and network interface statistics. Troubleshooting network issues, identifying open ports, detecting suspicious connections.

A

Netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A hexadecimal editor used for data recovery, low-level data processing, and computer forensics. Examining and editing binary data, recovering deleted files, malware analysis

A

Winhex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A powerful network scanner used for host discovery, port scanning, and OS detection. Network mapping, vulnerability scanning, security auditing.

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software for managing and securing mobile devices. Enforcing security policies, managing applications, remote wipe.

A

MDM (Mobile Device Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A powerful network protocol analyzer for capturing and inspecting network traffic. Troubleshooting network issues, analyzing network protocols, security incident investigation.

A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Cisco technology for collecting IP network traffic data. (Largely superseded by IPFIX). Network traffic analysis, intrusion detection, bandwidth monitoring.

A

Netflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A versatile tool for reading and writing data across network connections, often used for port scanning and banner grabbing. Network debugging, simple TCP/UDP communication, security testing (can be misused).

A

Netcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A comprehensive vulnerability scanner used to identify security weaknesses in systems and applications. Security assessments, penetration testing.

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A digital forensics platform that simplifies investigating computers and smartphones. Analyzing disk images, recovering deleted files, timeline analysis.

A

Autopsy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A tool for acquiring forensic images of disks and other media, and previewing recoverable data. Data acquisition, evidence preservation.

A

FTK Imager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Standard for exporting IP flow information from routers, switches, and firewalls. Network traffic analysis, intrusion detection, bandwidth monitoring.

A

IPFIX (NetFlow v10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A command-line utility (now largely superseded by ip in modern Linux systems) used to display and configure network interface settings, such as IP addresses, netmasks, and broadcast addresses. It’s important for troubleshooting network connectivity issues.

A

ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An open-source intelligence (OSINT) tool used to gather email addresses, subdomains, hostnames, employee names, open ports and banners from different public sources like search engines and PGP key servers. It’s a valuable tool for penetration testers and security professionals to identify potential attack vectors and information leaks.

A

theHarvester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly