Chapter 4 - Operations and Incident Response Flashcards
tracert (Windows)
Determines the route a packet takes to a destination by mapping the route
Time to Live (TTL) is counted in hops
traceroute (POSIX)
Determines the route a packet takes to a destination by mapping the route
Time to Live (TTL) is counted in hops
nslookup
Lookup information from DNS servers
Examples: canonical names, IP addresses, cache timers, etc.
Deprecated - used dig instead
dig
Lookup information from DNS servers
More advanced domain information - use instead of nslookup
Examples: canonical names, IP addresses, cache timers, etc.
ipconfig
Displays all current Windows TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol and Domain Name System settings
ifconfig
View and change the configuration of the network interfaces on your system for Linux
Network Mapper (nmap)
Find and learn more about network devices by doing port scans, operating system scans, service scans, and running additional scripts
ping
Tests reachability and can determine the round-trip time
Uses Internet Control Message Protocol (ICMP)
Primary troubleshooting tool
pathping
Combining ping and traceroute and is divided into two phases
Phase 1: runs a traceroute to build a map
Phase 2: Measures the round-trip time and packet loss at each hop
hping
Open-source packet generator and analyzer for the TCP/IP protocol
Used for security auditing and testing of firewalls and networks
Network Statistics (netstat)
Generates displays that show network status and protocol statistics used in many different operating systems
IP Scanners
Searching the network for IP addresses - locate active devices and avoid doing work on an IP address that isn’t there
Address Resolution Protocol (arp)
Determines a MAC address based on an IP address
Need the hardware address to communicate
arp -a
Is able to view the local ARP table
route
View a devices routing table to find out which way packets will go
Client URL (curl)
Can retrieve data using a URL such as web pages, FTP, emails, databases, etc.
Grab the raw data by searching, parsing, and automating
theHarvester
Gathers OSINT by scraping information from different web pages like google and bing
Examples: list of people from LinkedIn, a list of email contacts, etc.
sn1per
Combines many recon tools into a single framework
Examples: dnsenum, metasploit, nmap, theHarvester, etc.
scanless
Running port scans from a different host by doing a port scan proxy
dnsenum
Viewing host information (names) from DNS servers
Nessus
Industry leading in vulnerability scanning
Identifying known vulnerabilties before they can be exploited
Can provide a checklist or issues and filter out false positives
Cuckoo
A sandbox for malware and testing a file in a safe environment
Can track and trace API calls, network traffic, memory analysis
netstat -a
Show all active connections
netstat -b
Show binaries