Networking Threats, Assessments, And Defenses Flashcards

1
Q

Tracert/traceroute

A

How host connects and path and time took

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

nslookup/dig

A

Query DNS records - IP and DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ipconfig/ifconfig

A

Info on host - network configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nmap

A

Scan host for vulnerabilities and open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ping/pathping

A

Check if remote hosts are reachable - ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hping

A

Like ping but Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Netstat

A

Current communication on a host - help find open ports and make connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Netcat

A

Finds networks and scans for open ports- TCP or UDP - can start a connection to ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ARP

A

Show Address Resolution Protocol table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Curl

A

Transfer data over network using certain protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Harvester

A

Footprinting of network infrastructure - emails, subdomains, hosts, employee names, open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sn1per

A

Auto scanner for network vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scanless

A

Auto port scan scrapper - vulnerability exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dnsenum

A

Find IP blocks - can evaluate security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cuckoo

A

Malware analysis tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Head

A

First 10 lines of file
-n for specified line

17
Q

Tail

A

Last 10 lines of file
-n for specified line

18
Q

Cat

A

Shows content

19
Q

Grep

A

Look for string of characters

20
Q

Chmod

A

Change file permissions

21
Q

Logger

A

Adds messages to /var/log/syslog from CLI

22
Q

Tcpreplay

A

Modify and replay network traffic that’s already captured

23
Q

Tcpdump

A

Capture network communication

24
Q

DD

A

Make disk images, copy files

25
Memdump
Dumps memory to standard output
26
WinHex
Disk editor and hexadecimal editor for recovery and forensics
27
FTK Imager
Imaging tool to preview data
28
Autopsy
Forensics tool; windows
29
Crunch tool
Password attack tool Makes wordlists
30
Hashcat
Advanced password recovery tools 300 plus hashing algorithm
31
Medusa tool
Brute-forcer tool Multi thread-based parallel testing and modular design Authentication for remote
32
Ncrack
Network authentication cracking tool to secure networks against password attacks Looks fir weak passwords
33
Ophcrack
Password cracking based on rainbow tables
34
Hydra
Parallel login password crack
35
Mimikatz tool
Mines passwords, PINs, Hash, and Kerberos tickets ini windows
36
THC-pptp-Bruter
Brute-force w pptp VPN endpoints TCP port Independent package 300 password per second Exploits vulnerability in Microsoft’s anti brute force
37
Rsmangler
Wordlists like john the ripper
38