Hacking Tools Flashcards

1
Q

Web attack tools

A

Burp Suite, WebScarab, HTTPrint, BeeF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mimikatz

A

Pass the hash tool. Allows you to extract passwords in plain text. Included in metasploit as a module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Link-local Multicast Name Resolution/ NetBios Name Service attack

A

Victim uses service to find resource. Attacker broadcasts that they are the resource and poisons Victims service. This is multicast. If the interaction require authentication victim sends NTLNv2 user name and hash. offline cracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LLMNR/NBT-NS attack tools

A

NBNSpoof, Responder, Pupy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mitigations for LLMNR/NBT-NS attack

A

Disable LLMNR/NBT-NS services in computer security setting or Group Policy. Other security software NOS
Can monitor for at HKLM\software\policies\microsoft\windowsNT\DNSClient “DWORD” = 0 means it is disabled. Watch port 5355 (llmnr) and 137 (NTBIOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Password recovery tools

A

CHNTPW (Linux utility), Stellar Phoenix, Windows Password Recovery Ultimate, ISeePassword, Windows Password Recovery Tool, Passware Kit, PCUnlocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password Attacking tools

A

Cain and Abel (also network sniffer, Password sniffer, arp spoofer, Hamster proxy), ScoopLM (captures LM and NTLM and has a cracker), KerbCrack (sniffer and cracker), THC Hydra (dictionary attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

remote execution tools

A

RemoteExec, PDQDeploy, Dameware, Remote support, psEXEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Six stages of web server attack methodology

A

Information gathering, web server foot printing, website mirroring, vulnerability scanning, session hijacking, password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Trojan and virus making program

A
Dark Horse trojan virus maker
    Senna Spy Generator
    Trojan Horse Construction Kit
    Progenic mail Trojan Construction Kit
    Pandora's Box
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

net view /domian:domianname

A

Shows all systems in the domain name provided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

net view \systemname

A

Displays a list of domains, computers, or resources that are being shared by the specified computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

net use

A

List all network drives and mapped shares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

net use \target\ipc$ “” /u:”

A

Sets up a Null session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

net use Z: \somename\fileshare

A

Mounts Z: folder onto the machine if persistent:yes is added mount will stay after reboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password recovery tools 7

A

CHNTPW (Linux utility), Stellar Phoenix, Windows Password Recovery Ultimate, ISeePassword, Windows Password Recovery Tool, Passware Kit, PCUnlocker

17
Q

Password Attacking tools

A

Cain and Abel (also network sniffer, Password sniffer, arp spoofer, Hamster proxy), ScoopLM (captures LM and NTLM and has a cracker), KerbCrack (sniffer and cracker), THC Hydra (dictionary attack)

18
Q

remote execution tools

A

RemoteExec, PDQDeploy, Dameware, Remote support

19
Q

Hyena

A

Windows enumeration tool with GUI

20
Q

Forbidden Attack

A

The forbidden attack is a type of man-in-the-middle attack using hijacked HTTPS sessions. It seeks to exploit reusing the cryptographic nonce used during the TLS handshake. After hijacking the session, an attacker may inject malicious code and forged content in order to obtain sensitive information from the victim such as bank information or social security numbers.

21
Q

FREAK attack

A

“Factoring RSA Export Keys”) is a security exploit of a cryptographic weakness in the SSL/TLS protocols

22
Q

CRIME attack

A

CRIME (Compression Ratio Info-leak Made Easy) is a security exploit against secret web cookies over connections using the HTTPS and SPDY protocols that also use data compression.[1] When used to recover the content of secret authentication cookies, it allows an attacker to perform session hijacking on an authenticated web session, allowing the launching of further attacks