Cybersecurity Tools and Usage Flashcards
What is the primary use of Nmap?
Nmap is used for network discovery and security auditing.
Which tool is commonly used to search for Internet-connected devices?
Shodan is used to search for Internet-connected devices.
Which tool helps with gathering intelligence from social networks and online resources?
Maltego helps gather intelligence from social networks and online resources.
Which tool can be used for open-source intelligence gathering related to emails and domains?
The Harvester is used for open-source intelligence gathering related to emails and domains.
Fill in the blank: ______ is a reconnaissance tool used to discover information about domains.
Recon-NG is a reconnaissance tool used to discover information about domains.
Which tool is used to gather DNS information and subdomains?
Amass is used to gather DNS information and subdomains.
Which tool provides search capabilities for security certificates and services on the web?
Censys provides search capabilities for security certificates and services on the web.
Fill in the blank: The ______ Framework is used for gathering open-source intelligence.
The OSINT Framework is used for gathering open-source intelligence.
What is the purpose of Gobuster?
Gobuster is used for brute-force directory and file discovery.
Which tool is used for password cracking and uses a brute-force approach?
John The Ripper is a brute-force password cracking tool.
Which tool provides a framework for distributed password cracking?
Hydra is a framework for distributed password cracking.
Fill in the blank: ______ is a tool used for GPU-accelerated password cracking.
Hashcat is used for GPU-accelerated password cracking.
What is Ophcrack commonly used for?
Ophcrack is used for cracking Windows passwords using rainbow tables.
Which tool is used to crack passwords in a highly customizable manner?
Medusa is used for highly customizable password cracking.
Fill in the blank: ______ is a tool that specializes in attacking online services with brute-force attacks.
THC-Hydra is a tool that specializes in attacking online services with brute-force attacks.
Which tool is used to recover passwords stored in Windows operating systems?
Cain & Abel is used to recover passwords stored in Windows operating systems.
Which tool is a common wireless hacking tool used to capture and analyze Wi-Fi traffic?
Aircrack-NG is a common wireless hacking tool used to capture and analyze Wi-Fi traffic.
What is the purpose of Wifite?
Wifite is an automated wireless attack tool used to audit Wi-Fi networks.
Which tool allows for the detection and sniffing of wireless networks?
Kismet is used for the detection and sniffing of wireless networks.
Fill in the blank: ______ is a network analysis tool that allows for packet capturing.
TCPDump is a network analysis tool that allows for packet capturing.