4.1 Tools to Assess Security Flashcards

1
Q

3 things Nmap can identify

A
  1. open ports on a device
  2. OS
  3. services running
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

curl

A

Used to retrieve the actual text HTML returned from a website (URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define hping and 2 capabilities

A
  1. A more robust version of ping that provides more detailed information
  2. Can be used to scan for ports
  3. Allows crafting of custom data packets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

theHarvester

A

OSINT tool that gathers information from a website, such as finding email addresses for specific domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

sn1per

A

Combines capabilities of many tools to provide useful summaries of vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

scanless

A

Intelligence gathering tool that allows running port scans through a proxy to mask the identity of the source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

dnsenum

A

A scanning tool that runs against DNS servers to gather information, such as discovering sub-domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Nessus

A

A scanning tool that uses a list of known vulnerabilities to identify device vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cuckoo

A

Allows testing of executables in a sandbox environment to determine if there are any vulnerabilities or malware built into it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

netstat

A

Identifies executables/services that are using the network on a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define netcat tool and 4 capabilities

A

Allows one to read, write, redirect, encrypt communications across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

logger

A

Logs information to the system logs, useful for adding debug information from a script as it runs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

chmod

A

changes permissions on a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Capabilities of OpenSSL (3)

A
  1. Create X.509 certificates, CSRs, CRLs
  2. Hashing
  3. Encryption/Decryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireshark uses (3)

A
  1. Capture wired/wireless packets
  2. View traffic to find unknown packets or verify security controls
  3. Decode traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define tcpdump

A

Linux command-line packet capture tool, similar to Wireshark

17
Q

tcpreplay uses (3)

A
  1. Test IDS/IPS and firewalls to verify function
  2. Test/Tune devices by flooding with packets
  3. Evaluate performance of devices and throughput by flooding with traffic
18
Q

How is dd command useful in forensics?

A

Creates a bit-by-bit copy of a drive for analysis

19
Q

How is memdump useful in forensics?

A

Copies data from memory to another device in a format that is readable by many forensics tools

20
Q

Winhex forensics capabilities (4)

A
  1. Windows-based hexadecimal file editor
  2. Data recovery of disks, files, RAM
  3. Disk cloning
  4. Secure wipe
21
Q

FTKImager capabilities (3)

A
  1. Windows tool that can image drives, mount them, and perform file utilities
  2. Can used from Windows for non-Windows platforms
  3. Can save images to other formats, such as DD, ghost, or Expert Witness
22
Q

Autopsy capabilities (2)

A
  1. Provides digital information from a hard drive or image file
  2. Collects images, files, web bookmarks, emails, etc
23
Q

Define Exploitation frameworks (2)

A
  1. Tools that allow crafting an attack to run against systems for testing purposes
  2. Has modules to run attacks for known vulnerabilities
24
Q

2 Common exploitation frameworks

A

Metaspoilt and Social-Engineer Toolkit