Given a scenario, use the appropriate tool to assess organizational security Flashcards

1
Q

Network reconnaissance and discovery

A
tracert/traceroute
nslookup/dig
ipconfig/ifconfig
nmap
ping/pathping
hping
netstat
netcat
IP scanners
arp
route
curl
the harvester
sn1per
scanless
dnsenum
Nessus
Cuckoo
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

tracert/traceroute

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

nslookup/dig

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ipconfig/ifconfig

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

nmap

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ping/pathping

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hping

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

netstat

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

netcat

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IP scanners

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

arp

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

route

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

curl

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the harvester

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

sn1per

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

scanless

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

dnsenum

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Nessus

19
Q

Cuckoo

20
Q

File manipulation

A
head
tail
cat
grep
chmod
logger
25
Q

chmod

26
Q

logger

27
Q

Shell and script environments

A

SSH
PowerShell
Python
OpenSSL

29
Q

PowerShell

30
Q

Python

31
Q

OpenSSL

32
Q

Packet capture and replay

A

Tcpreplay
Tcpdump
Wireshark

33
Q

Tcpreplay

34
Q

Tcpdump

35
Q

Wireshark

36
Q

Forensics

A
dd
Memdump
WinHex
FTK imager
Autopsy
38
Q

Memdump

39
Q

WinHex

40
Q

FTK imager

41
Q

Autopsy

42
Q

Exploitation frameworks

43
Q

Password crackers

44
Q

Data sanitization