OpenSource SecTools (Nessus, nmap, Wireshark, Snort, Metasploit) Flashcards

1
Q

What’s your experience with Nessus?

A
  • Setup and Configuration
  • Scan Analysis
  • Reviewing a Scan
  • Saving Reports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Basic steps in performing a vulnerability scan?

A
  • Define scan parameters
  • Create and Launch the scan
  • Analyze results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two methods for performing a vulnerability scan?

A
  • Network scanning
    (external details and vulnerability analysis)
  • Credentialed scanning
    (internal misconfigurations and hidden vulnerabilities)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability Management?

A

Vulnerability Management Phases

  1. Define the desired state of security
  2. Create baslines
  3. Prioritize vulnerabilities
  4. Mitigate vulnerabilities
  5. Monitor the Environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What Security Tools to use for Assessing Vulnerability?

A
◦ Network Mapping	
            Nmap
        ◦ Vulnerability Scanning
        ◦ Network Sniffing
            Wireshark 
        ◦ Password Analysis
            Cain & Able
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nmap use?

A

❏ network asset inventory
❏ vulnerability assessment
❏ penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Nmap common options ?

A

sS: Syn (Until an RST is sent back)
sT: Full connect scan (establish three-way-handshake)
-sU: Sends UDP packets
-p: Specify a port number
-sn: Disables port scanning
-T: Flag for speed (T0 slowest - T5 fastest)
-sV: see the versioning of the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Getting Help - NM?

A

All OS commands:
o “nmap -V” -> Nmap version information, platform running on and how it was
compiled.
o “nmap” or “nmap -h” -> Provides the list of simple scan options available, with
examples.
o “nmap –script-help ” -> Provides details of the script, as published
by the author

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Scan Phases of Nmap?

A

o Phase 1: Script Pre-scanning

o Phase 2: Target Enumeration

o Phase 3: Host Discovery

o Phase 4: Reverse-DNS resolution

o Phase 5: Port Scanning

o Phase 6: Version Detection

o Phase 7: OS Detection

o Phase 8: Traceroute

o Phase 9: Script scanning

o Phase 10: Output

o Phase 11: Script post-scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Nmap, Does the order of command options matter?

A

No. Can come before or after the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nmap target options?

A

hostname(s)
IP address(s)
Network w/cider notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Nmap output options

A
  • oN : Outputs results to text file in normal Nmap format.
  • oX: Outputs to an XML formatted file.
  • oS: Outputs to script kiddy file format
  • oG: Greppable formate (for use with grep)
  • oA : outputs normal, XML, and greppable format.
  • v or -vv: determines the level of details/verbosity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Snort experience?

A
  • Using Snort and Wireshark to analyze traffic
  • Create custom rules
  • Monitoring Network Traffic
  • IDS Setup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Metasploite experience?

A
  • Linux exploitation
    (Vulnerable Apache and open SSL - Heartbleed)
    and
    (Bash and CGI_Apache - Remote Command Execution)
  • Using Armitage
  • Using MSFVenom (Very high view)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common Snort Commands?

A
  • snort -V: Shows Version
  • snort -l: Log file Location placement
  • the -c: where to place snort.conf
  • the -T: Test configuration
  • the -r: Read the following capture file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Metasploit Hands-On Course?

A
  • Metasploit Payloads & Stagers

- Vulnerability Scanners (Nessus)