Intro_Pentest_Disros Flashcards

1
Q

Linux Distro-based Penetration Test tools are

A

Parrot O/S, BlackArch, Pentoo, BackTrack and Kali

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

examples of Open Source Pentest Ditsros:

A

Metasploit, Kali and BlackTrack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GNOME, KXDE, KDE, XFCE, I3WM, and MATE are the names of

A

desktop environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Mapper

A

Nmap (runs from the command line), and Zenmap is a GUI version of Nmap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Mapper functions are:

A

Host discovery, Port Scanning and version detection, and OS detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wireshark old name is

A

Ethereal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireshark is capable of filtering specific frames that are required to

A

Crack Protocols like WPA2 (EAPoL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Maltego is

A

Forensics and Data mining application
Graphically presents relationships between ( people, Companies, Websites).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability scanning Tool from Tenable

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Nessus functions are

A

Vulnerability scans, finding identifying Misconfigurations, Looking for default passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OpenVAS

A

Open Source Vulnerability Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Utility for TCP/IP Tool

A

NetCat is designed to read and write data across TCP and UDP connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ncat is

A

a revision of NtCat that adds more functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password Cracking tools

A

CeWL, PWDump, Iohn the Ripper, and Hydra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gather keywords for a URL

A

CeWL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hash dumping and offline attacks

A

PWDump

17
Q

online password attacks

A

Hydra

18
Q

Multiples of password crackers are combined and work with various hashes.

A

John the Ripper