14B: Use Remote Access Tools Flashcards
3.1 Given a scenario, research attack vectors and perform network attacks. 5.3 Explain use cases of the following tools during the phases of a penetration test.
Application protocol supporting secure tunneling and remote terminal emulation and file copy; runs over TCP port 22.
SSH
An older remote protocol that does not support encryption and is disabled on most modern systems. However, some older or insecure systems may still have this service enabled (tcp 23)
telnet
A Linux command that is similar to Telnet, but if the server has an .rhosts file configured a certain way, you won’t even need to supply credentials.
rsh/rlogin
Command-line utility used to read from or write to TCP, UDP, or Unix domain socket network connections.Highly versatile but does not use encryption.
netcat
Tool developed for Nmap as an improvement over Netcat, not only retaining most of the functionality, but also adding more, of which an important one is support for SSL.
ncat