4.1: Given a scenario, use the appropriate tool to assess organizational security. Flashcards

1
Q

Network Reconnaissance and Discovery

A
tracert/traceroute
nslookup/dig
ipconfig/ifconfig
nmap
ping/pathping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hping

A

Hping is a TCP/IP packet creation tool that allows a user to craft raw IP, TCP, UDP, and ICMP packets from scratch. This tool provides a means of performing a wide range of network operations;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EXAM TIP

A

The netstat command is useful for viewing all listening ports on a computer and determining which connections are active.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

netcat

A

The netcat utility is the tool of choice in Linux for reading from and writing to network connections using TCP or UDP. Like all Linux command-line utilities, it is designed for scripts and automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

theHarvester

A

heHarvester is a Python-based program designed to assist penetration testers in the gathering of information during the reconnaissance portion of a penetration test. This is a useful tool for exploring what is publicly available about your organization on the Web, and it can provide information on employees, e-mails, and subdomains using different public sources such as search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tcpreplay

A

Tcpreplay is the name for both a tool and a suite of tools. As a suite, tcpreplay is a group of free, open source utilities for editing and replaying previously captured network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

memdump

A

Linux has a utility program called memory dumper, or memdump. This program dumps system memory to the standard output stream, skipping over any holes in memory maps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WinHex

A

WinHex is a hexadecimal file editor. This tool is very useful in forensically investigating files, and it provides a whole host of forensic functions such as the ability to read almost any file, display contents of the file, convert between character sets and encoding, perform hash verification functions, and compare files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly