Given a scenario, use the appropriate tool to assess organizational security Flashcards

1
Q

Network reconnaissance and discovery

A
tracert/traceroute
nslookup/dig
ipconfig/ifconfig
nmap
ping/pathping
hping
netstat
netcat
IP scanners
arp
route
curl
the harvester
sn1per
scanless
dnsenum
Nessus
Cuckoo
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

tracert/traceroute

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

nslookup/dig

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ipconfig/ifconfig

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

nmap

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ping/pathping

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hping

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

netstat

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

netcat

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IP scanners

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

arp

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

route

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

curl

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the harvester

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

sn1per

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

scanless

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

dnsenum

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Nessus

A
19
Q

Cuckoo

A
20
Q

File manipulation

A
head
tail
cat
grep
chmod
logger
21
Q

head

A
22
Q

tail

A
23
Q

cat

A
24
Q

grep

A
25
Q

chmod

A
26
Q

logger

A
27
Q

Shell and script environments

A

SSH
PowerShell
Python
OpenSSL

28
Q

SSH

A
29
Q

PowerShell

A
30
Q

Python

A
31
Q

OpenSSL

A
32
Q

Packet capture and replay

A

Tcpreplay
Tcpdump
Wireshark

33
Q

Tcpreplay

A
34
Q

Tcpdump

A
35
Q

Wireshark

A
36
Q

Forensics

A
dd
Memdump
WinHex
FTK imager
Autopsy
37
Q

dd

A
38
Q

Memdump

A
39
Q

WinHex

A
40
Q

FTK imager

A
41
Q

Autopsy

A
42
Q

Exploitation frameworks

A
43
Q

Password crackers

A
44
Q

Data sanitization

A