CompTIA PenTest+ Certification Exam Objectives 4.0 Penetration Testing Tools Flashcards
What is reconnaissance?
Reconnaissance is the practice of covertly discovering and collecting information about a system or host
What is enumeration?
Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system.
The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit the system gaining phase
What is vulnerability scanning?
Vulnerability scanning is used to identify and create an inventory of all systems, including servers, desktops, laptops, virtual machines, containers, firewalls, switches and printers that are connected to a network.
For each device that it identifies it also attempts to identify the operating system it runs and the software installed on it, along with other attributes such as open ports and user accounts.
What is offline password cracking?
This is an attempt to recover one or more passwords from a password storage file that has been recovered from a target system.
This often times is utilized when time is limited in a system is limited and we obtain a list of password hashes, we will take the file and crack the hashes elsewhere instead of the target system.
What is persistence?
Persistence allows an attacker to re-infect./re-enter a machine maintaining their existing connection after events such as a system reboot, changed credentials or even a re-imaging.
This can be done by modifying registries, daemons, and even creating ourselves a lil account.
Essentially a backdoor into a system!
What is configuration compliance?
Configuration compliance essentially is ensuring system/host/applications are up to mandated standards.
This would include systems that process/maintain PCI DSS, healthcare information, PII.
Certain regulations such as encryption type and protocol must be met to be in compliance
What is evasion?
Evasion techniques are regularly used by cyber attackers to avoid detection and hide malicious activity.
This could be bypassing controls or camouflaging within an environment using masquerading techniques
What is forensics?
Forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation to either stakeholders or even fed-boys
What is fuzzing?
Fuzzing or fuzz test is a black box software testing technique, which basically consists of finding implementation bugs using malformed data injection in an automated fashion
What is Nikto?
Nikto is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items, including dangerous files/programs, outdated versions and version specific problems.
It also checks for server configuration items such as the presence of multiple index files, HTTP server options and will attempt to identify installed web servers and software
What is OpenVAS?
OpenVAS is a open-source vulnerability scanner.
It’s capabilities include unauthenticated and authenticated testing, various high-level and low-level internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability testing
What is SQLMap?
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.
This tool can affect any website or web app that may have a SQL database linked to it
It comes with a powerful detection engine, many features.
Supports: MySQL Oracle PostgreSQL MSSQL
What is Nessus?
Nessus is a remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that hackers could use to gain access to any computer you have connected to a network.
It scores the vulnerability based on severity and even can provide remediation of said vulnerabilities
What is hashcat?
Hashcat is a popular and effective password cracker widely used by both sysadmins and pentesters, as well as criminals
Hashcat is particularly fast, efficiient and versatile tool that assists in brute-forcing attack by conducting them with hash values of passwords that the tool is guessing or applying
Can be used for dictionary attacks and rainbow tables as well
What is Medusa?
Medusa is a speedy parallel, and modular, login brute-forcer.
The goal is to support as many services which allow remote authentication as possible
What is THC Hydra?
Hydra is a parallelized network login cracker.
This tool makes it possible to brute force services such as FTP, SSH, Telnet, MSSQL etc
What is CeWL?
CeWL is a ruby app which spiders a given URL to a specified depth, optionally following external links and returns a list of words which can then be used for password crackers
What is John the Ripper?
John The Ripper is an open source password cracking software tool.
It is designed to test password strength, brute-force encrypted (hash) password, and crack passwords via dictionary attacks.
What is Cain and Abel?
Cain and Abel is a password “recovery” tool for M$.
It can recover many kinds of passwords using methods such as dictionary attacks, brute force and cryptanalysis attacks.
Cryptanalysis attacks are done via rainbow tables
Cain and Abel uses dictionary lists as a basis for cracking passwords, brute-force atacks by trying different passwords many times every second and decoding information stored on the hard drives, the packer attempts to determine the correct password
What is Mimikatz?
Mimikatz is a leading post-exploitation tool that dumps passwords from memroy, as well as hashes, PINs and Kerberos tickets.
Other useful attacks Mimikatz enables are pass-the-hash, pass-the-ticket, or building Golden Kerberos tickets.
This is geared for Windows and is a method for post-exploitation lateral movement
What is Patator?
Patator is a multi-purpose brute-forcer, with a modular design and flexible usage
Patator was written out of frustration from using Hydra, Medusa and Ncrack
Instead, Patator is written in Python that strives to be more reliable and flexible than the fellow predecessors
What is DirBuster?
DirBuster is a multi-threaded Java application designed to brute force directories and file names on web/application servers.
DirBuster attempts to find pages and applications hidden within a web page
DirBuster uses list of common directories in hopes of revealing the same directories
What is W3AF?
W3AF is a web application attack and audit framework
It is open source vulnerability scanner and exploitation tool geared towards web applications.
The scanner offers a graphical user interface
What is OllyDBG?
OllyDBG is an x86 debugger that emphasizes binary code analysis, which is useful when source code is not available.
It traces registers, recognizes procedures, API calls, switches, tables, constants, and strings, as well as locates routines from object files and libraries.
This is useful for reverse engineering programs.
What is Immunity Debugger?
Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files.
It builds on a solid user interface with function graphing
Includes the GUI and command line.
What is GDB?
GNU Project Debugger
GNU allows you to see what is going on ‘inside’ another program while it executes – or what another program was doing at the moment it crashed.
GNU can start your program, specifying anything that might affect its behavior
Make your program stop on specified conditions
Examine what has happened when you program has stopped
Change things in your program, so you can experiment with correcting the effects of one bug and go on to learn about another
Used for UNIX and Windows as well as MAC OS