4.1 Tools to Assess Security Flashcards
3 things Nmap can identify
- open ports on a device
- OS
- services running
curl
Used to retrieve the actual text HTML returned from a website (URL)
Define hping and 2 capabilities
- A more robust version of ping that provides more detailed information
- Can be used to scan for ports
- Allows crafting of custom data packets
theHarvester
OSINT tool that gathers information from a website, such as finding email addresses for specific domain
sn1per
Combines capabilities of many tools to provide useful summaries of vulnerabilities
scanless
Intelligence gathering tool that allows running port scans through a proxy to mask the identity of the source
dnsenum
A scanning tool that runs against DNS servers to gather information, such as discovering sub-domains
Nessus
A scanning tool that uses a list of known vulnerabilities to identify device vulnerabilities
Cuckoo
Allows testing of executables in a sandbox environment to determine if there are any vulnerabilities or malware built into it
netstat
Identifies executables/services that are using the network on a device
Define netcat tool and 4 capabilities
Allows one to read, write, redirect, encrypt communications across a network
logger
Logs information to the system logs, useful for adding debug information from a script as it runs
chmod
changes permissions on a file
Capabilities of OpenSSL (3)
- Create X.509 certificates, CSRs, CRLs
- Hashing
- Encryption/Decryption
Wireshark uses (3)
- Capture wired/wireless packets
- View traffic to find unknown packets or verify security controls
- Decode traffic
Define tcpdump
Linux command-line packet capture tool, similar to Wireshark
tcpreplay uses (3)
- Test IDS/IPS and firewalls to verify function
- Test/Tune devices by flooding with packets
- Evaluate performance of devices and throughput by flooding with traffic
How is dd command useful in forensics?
Creates a bit-by-bit copy of a drive for analysis
How is memdump useful in forensics?
Copies data from memory to another device in a format that is readable by many forensics tools
Winhex forensics capabilities (4)
- Windows-based hexadecimal file editor
- Data recovery of disks, files, RAM
- Disk cloning
- Secure wipe
FTKImager capabilities (3)
- Windows tool that can image drives, mount them, and perform file utilities
- Can used from Windows for non-Windows platforms
- Can save images to other formats, such as DD, ghost, or Expert Witness
Autopsy capabilities (2)
- Provides digital information from a hard drive or image file
- Collects images, files, web bookmarks, emails, etc
Define Exploitation frameworks (2)
- Tools that allow crafting an attack to run against systems for testing purposes
- Has modules to run attacks for known vulnerabilities
2 Common exploitation frameworks
Metaspoilt and Social-Engineer Toolkit