Information Gathering and Vulnerability Identification Flashcards
- Focuses on security breach and denial of service incidents, providing alerts and incident-handling and avoidance guidelines.
- Also conducts an ongoing public awareness campaign and engages in research aimed at improving security systems.
Computer Emergency Response Team (CERT)
Database contains a list of publicly known cybersecurity vulnerabilities associated with software in general instead of a specific product.
Common Weakness Enumeration (CWE)
Website has a database of publicly known vulnerabilities for various OS (i.e. Windows, Mac, Linux)
Common Vulnerabilities and Exposures (CVE)
Database contains information about known attack patterns used to exploit weaknesses, including physical security vulnerabilities.
The Common Attack Pattern Enumeration and Classification (CAPEC)
Website provides a summary of current security vulnerabilities ranked by their severity
National Vulnerability Database (NVD)
Tool used on a wireless network to capture the authentication handshake
AiroDump-ng
- A utility that you can use to gather metadata from an organization’s documents, such as Word, PowerPoint, OpenOffice, and Adobe Reader files
- Searches popular search engines, such as Google and Bing, for these files and extracts any metadata they may contain
Fingerprinting Organizations with Collected Archives (FOCA)
An open source research source that is published by the same organization that produces the nmap utility
Full Disclosure