Miscellaneous Tools Flashcards

1
Q

SearchSploit

A

a command line search tool for Exploit-DB that also allows you to take a copy of Exploit Database and search it offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PowerSploit

A

a series of Microsoft PowerShell scripts that can be used in post-exploitation scenarios during authorized penetration tests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Responder

A

a Link Local Multicast Name Resolution (LLMNR), NBT-NS, and MDNS poisoner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Impacket tools

A

an open source collection of modules written in Python for programmatically constructing and manipulating network protocols. Impacket contains several tools for remote service execution, Kerberos manipulation, Windows credential dumping, packet sniffing, and relay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Empire

A

implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Metasploit

A

a pentesting framework that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

mitm6

A

a pentesting tool that exploits the default configuration of Windows to take over the default DNS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CrackMapExec

A

Python-based post-exploitation tool, CrackMapExec is used by adversaries and penetration tests to gain remote access to protected servers. It can be used to abuse Windows Management Instrumentation (WMI) for execution of malicious commands and payloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TruffleHog

A

search source code repositories for high entropy strings that can represent git secrets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Censys

A

provides a 360-degree depiction of an organization’s Internet attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly