Pentest+ Tool Round-Up Flashcards

1
Q

WHOIS

A

OSINT TOOL: A query and response protocol that is widely used for querying databases that store the registered users or assignees of an internet resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nslookup

A

OSINT TOOL: A network administration command-line tool for querying DNS to obtain the mapping between domain names and IP addresses, or other DNS records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FOCA

A

OSINT TOOL: Used to find metadata and hidden information in collected documents from an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

theHarvester

A

OSINT TOOL: A program for gathering emails, subdomains, hosts, employee names, email addresses, PGP key entries, open ports, and service banners from servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shodan

A

OSINT TOOL: A website search engine for web cameras, routers, servers, and other devices that are considered part of the internet of things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maltego

A

OSINT TOOL: A piece of commercial software used for conducting open-source intelligence that visually helps connect those relationships. It can automate the querying of public sources of data and then compare it with other info from various sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Recon-ng

A

OSINT TOOL: Uses a system of modules to add additional features and functions for your use. It is a cross-platform web recon framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Censys

A

OSINT TOOL: A website search engine used for finding hosts and networks across the internet with data about their configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nikto

A

SCANNING TOOL: A web vulnerability scanner that is used to assess custom web applications that a company may have coded themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OpenVAS

A

SCANNING TOOL: An open source vulnerability scanner that is used to identify vulnerabilities and assign a risk rating for the targeted assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nessus

A

SCANNING TOOL: A proprietary vulnerability scanner that is used to conduct basic, advanced, and compliance vulnerability scans to measure the effectiveness of the system’s security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQLmap

A

SCANNING TOOL: An open source database scanner that searches for SQL injection vulnerabilities that can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open SCAP

A

SCANNING TOOL:A tool created by NIST that is used to create a predetermined security baseline that can be used to determine vulnerabilities or deviations in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wapiti

A

SCANNING TOOL: A web application vulnerability scanner which will automatically navigate a web app looking for areas where it can inject data to target different vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WPScan

A

SCANNING TOOL: A WordPress site vulnerability scanner that identifies the plugins used by the website against a database of known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brakeman

A

SCANNING TOOL: A static code analysis security tool that is used to identify vulnerabilities in applications written in Ruby on Rails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ScoutSuite

A

SCANNING TOOL: An open source tool written in Python that can be used to audit instances and policies created on multi-cloud platforms by collecting data using API calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Wireshark

A

NETWORK TOOL: An open source protocol analysis tool that can conduct packet sniffing, decoding, and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Tcpdump

A

NETWORK TOOL: A command-line protocol analysis tool that can conduct packet sniffing, decoding, and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hping

A

NETWORK TOOL: An open source packet crafting tool used to exploit vulnerable firewalls and IDS/IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Aircrack-ng

A

WIRELESS TOOL: A powerful open source wireless exploitation tool kit consisting of airomon-ng, airodump-ng, aireplay-ng, and airocrack-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Airomon-ng

A

WIRELESS TOOL: Used to monitor wireless frequencies to identify access points and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Airodump-ng

A

WIRELESS TOOL: Used to capture network traffic and save it to a PCAP file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Aireplay-ng

A

WIRELESS TOOL: Used to conduct a de-authentication attack by sending spoofed death requests to the access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Airocrack-ng
WIRELESS TOOL: Used to conduct protocol and password cracking of wireless encryption
26
Kismet
WIRELESS TOOL: An open source tool that contains a wireless sniffer, a network detector, and an intrusion detection system
27
Wifilite
WIRELESS TOOL: A wireless auditing tool that can be used to conduct a site survey to locate a rogue and hidden access points
28
Rogue Access Point
WIRELESS TOOL: Any wireless access point that has been installed on a secure network without explicit authorization from a local network administrator
29
EAPHammer
WIRELESS TOOL: A python-based toolkit that can be used to steal EAP authentication credentials used in a WPA2-Enterprise network
30
mdk4
WIRELESS TOOL: A wireless vulnerability exploitation toolkit that can conduct 10 different types of 801.11 exploitation techniques
31
Spooftooph
WIRELESS TOOL: Automates the spoofing or cloning of a Bluetooth device's name, class, and address
32
Reaver
WIRELESS TOOL: A tool that conducts a brute force attack against an access point's Wi-Fi Protected Setup (WPS) Pin to recover the WPA PSK
33
WiGLE
WIRELESS TOOL: Wireless Geographic Logging Engine... A wireless OSINT tool that consists of a website and database dedicated to mapping and indexing all known wireless access point
34
Fern
WIRELESS TOOL: Tests wireless networks by conducting password recovery through brute force and dictionary attacks, as well as session hijacking, replay, and on-path attacks
35
SET
SOCIAL ENGINEERING TOOL: Social Engineering Toolkit... A python based collection of tools and scripts that are used to conduct social engineering during a penetration test
36
BeEF
SOCIAL ENGINEERING TOOL: Browser Exploitation Framework... Used to assess the security posture of a target environment using cross-site attack vectors. Great tool for testing browsers and associated web servers and applications
37
SSH
REMOTE ACCESS TOOL: Secure Shell... A command line tool that is used to remotely control another workstation over a LAN or WAN
38
Netcat
REMOTE ACCESS TOOL: A command line utility used to read from or write to TCP, UDP, or Unix domain socket network connections
39
ProxyChains
REMOTE ACCESS TOOL: A command line tool that enables penetration testers to mask their identity and/or source IP addresses by sending messages through proxy servers or other intermediaries
40
Hashcat
CREDENTIAL TESTING TOOL: A modern password and hash cracking tool that supports the use of GPUs for parallel processing when conducting dictionary, brute force, and hybrid attacks
41
Medusa
CREDENTIAL TESTING TOOL: A parallel brute-force tool that is used against network logins to attack services that support remote authentication
42
Hydra
CREDENTIAL TESTING TOOL: A parallel brute-force tool that also supports a pw-inspect module to only attempt passwords from a dictionary that meets the minimum password requirements for a given system
43
CeWL
CREDENTIAL TESTING TOOL: Used to generate word lists based on the automatic crawling of a website to collect worda and metadata from the site
44
John the Ripper
CREDENTIAL TESTING TOOL: Password cracking tool that supports large sets of hashes and dictionary and brute force attacks
45
Cain
CREDENTIAL TESTING TOOL: A legacy password cracking and hash dumping that can conduct network sniffing to identify hashes that may be vulnerable to cracking
46
Patator
CREDENTIAL TESTING TOOL: A multi-purpose brute force tool that supports several different methods, including ftp, ssh, smb, vnc, and zip password cracking
47
DirBuster
CREDENTIAL TESTING TOOL: A brute force tool run against a web application or server to identify unlisted directories and file names that may be accessed
48
w3af
CREDENTIAL TESTING TOOL: Web Application Attack and Audit Framework... used to identify and exploit a large set of web-based vulnerabilities such as SQL injection and cross site scripting
49
OWASP ZAP
WEB APPLICATION TOOL: open source web application security scanner and attack proxy used in automated and manual testing and identification of web application vulnerabilities
50
Burp Suite
WEB APPLICATION TOOL: Used in raw traffic interception, inspection, and modification during automated testing, manual request modification, and passive web application analysis
51
Gobuster
WEB APPLICATION TOOL: Brute force dictionary, file, and DNS identification tool used to identify unlisted resources in a web application
52
Scout Suite
CLOUD TOOL: Open source tool written in Python that can be used to audit instances and policies created on multi-cloud platforms by collecting data using API calls
53
CloudBrute
CLOUD TOOL: Used to find a target's infrastructure, files, and apps across the top cloud service providers, including Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, and Linode
54
Pacu
CLOUD TOOL: Exploitation framework used to assess the security configuration of an AWS account
55
Cloud Custodian
CLOUD TOOL: Open source cloud security, governance, and management tool designed to help admins create policies based on different resource types
56
OpenStego
STEGANOGRAPHY TOOL: Free steganography solution to conduct data hiding within a file and watermarking of files with invisible signatures to detect unauthorized file copying
57
Steghide
STEGANOGRAPHY TOOL: Open source steganography tool used to conceal a payload by compressing, concealing, and encrypting its data in an image or audio file
58
Snow
STEGANOGRAPHY TOOL: Command line tool that conceals a payload within the whitespace of an ASCII formatted text file in plaintext or encrypted format
59
Coagula
STEGANOGRAPHY TOOL: Image synthesizer tool that can be used to create a sound file from a given image
60
Sonic Visualizer
STEGANOGRAPHY TOOL: Open source application for viewing and analyzing the contents of music audio files
61
TinEye
STEGANOGRAPHY TOOL: Website that can be used to conduct reverse image searches using image recognition
62
Metagoofil
STEGANOGRAPHY TOOL: Python based tool that can search for metadata from public documents located on a target's website
63
Online SSL Checkers
STEGANOGRAPHY TOOL: Web application that can be used to test the validity, strength, and security of an SSL or TLS digital certificate for a given website
64
OllyDBG
DEBUGGING TOOL: Linus debugger that can be used to analyze binary code found in 32-bit Windows applications
65
Immunity Debugger
DEBUGGING TOOL: Built specifically for penetration testers to write exploits, analyze malware, and reverse engineer binary files using Python scripts and APIs
66
GNU Debugger (GDB)
DEBUGGING TOOL: Open source cross-platform debugger for Unix, Windows, and MacOS
67
WinDbg
DEBUGGING TOOL: Free debugging tool that is distributed by Microsoft for use in the Windows operating system
68
Interactive Disassembler (IDA)
DEBUGGING TOOL: Commercial disassembler and debugging tool that generates assembly language source code from machine-executable code
69
Covenant
DEBUGGING TOOL: Open source .NET framework focused on penetration testing that also has a development and debugging component
70
SearchSploit
Tool used to find exploits available in Exploit-DB
71
PowerSploit
A collection of PowerShell modules that create an extensive exploitation framework for use against Windows systems
72
Responder
Command line tool in Kali Linux that is used to poison NetBIOS, LLMNR, and MDNS name resolution requests
73
Empire
C2 framework that uses PowerShell for common post-exploitation tasks on Windows systems and Python for post-exploitation tasks on Linux systems
74
Metasploit
Multi-purpose computer security and penetration testing framework that uses modularized attacks on known vulnerabilities
75
mitm6
IPv6 DNS hijacking tool that attempts to set the malicious actor as the DNS server by replying to the DHCPv6 messages and then redirecting the victim to another malicious host
76
CrackMapExec
Post exploitation tool to identify vulnerabilities in Active Directory environments
77
TruffleHog
A Git secrets search tool that automatically crawls through a repository looking for accidental commits of secrets to the Git repository
78
Censys
Website search engine tool used for finding hosts and networks across the internet with data about their configuration