Pentest+ Tool Round-Up Flashcards

1
Q

WHOIS

A

OSINT TOOL: A query and response protocol that is widely used for querying databases that store the registered users or assignees of an internet resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nslookup

A

OSINT TOOL: A network administration command-line tool for querying DNS to obtain the mapping between domain names and IP addresses, or other DNS records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FOCA

A

OSINT TOOL: Used to find metadata and hidden information in collected documents from an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

theHarvester

A

OSINT TOOL: A program for gathering emails, subdomains, hosts, employee names, email addresses, PGP key entries, open ports, and service banners from servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shodan

A

OSINT TOOL: A website search engine for web cameras, routers, servers, and other devices that are considered part of the internet of things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maltego

A

OSINT TOOL: A piece of commercial software used for conducting open-source intelligence that visually helps connect those relationships. It can automate the querying of public sources of data and then compare it with other info from various sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Recon-ng

A

OSINT TOOL: Uses a system of modules to add additional features and functions for your use. It is a cross-platform web recon framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Censys

A

OSINT TOOL: A website search engine used for finding hosts and networks across the internet with data about their configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nikto

A

SCANNING TOOL: A web vulnerability scanner that is used to assess custom web applications that a company may have coded themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OpenVAS

A

SCANNING TOOL: An open source vulnerability scanner that is used to identify vulnerabilities and assign a risk rating for the targeted assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nessus

A

SCANNING TOOL: A proprietary vulnerability scanner that is used to conduct basic, advanced, and compliance vulnerability scans to measure the effectiveness of the system’s security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQLmap

A

SCANNING TOOL: An open source database scanner that searches for SQL injection vulnerabilities that can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open SCAP

A

SCANNING TOOL:A tool created by NIST that is used to create a predetermined security baseline that can be used to determine vulnerabilities or deviations in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wapiti

A

SCANNING TOOL: A web application vulnerability scanner which will automatically navigate a web app looking for areas where it can inject data to target different vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WPScan

A

SCANNING TOOL: A WordPress site vulnerability scanner that identifies the plugins used by the website against a database of known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brakeman

A

SCANNING TOOL: A static code analysis security tool that is used to identify vulnerabilities in applications written in Ruby on Rails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ScoutSuite

A

SCANNING TOOL: An open source tool written in Python that can be used to audit instances and policies created on multi-cloud platforms by collecting data using API calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Wireshark

A

NETWORK TOOL: An open source protocol analysis tool that can conduct packet sniffing, decoding, and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Tcpdump

A

NETWORK TOOL: A command-line protocol analysis tool that can conduct packet sniffing, decoding, and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hping

A

NETWORK TOOL: An open source packet crafting tool used to exploit vulnerable firewalls and IDS/IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Aircrack-ng

A

WIRELESS TOOL: A powerful open source wireless exploitation tool kit consisting of airomon-ng, airodump-ng, aireplay-ng, and airocrack-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Airomon-ng

A

WIRELESS TOOL: Used to monitor wireless frequencies to identify access points and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Airodump-ng

A

WIRELESS TOOL: Used to capture network traffic and save it to a PCAP file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Aireplay-ng

A

WIRELESS TOOL: Used to conduct a de-authentication attack by sending spoofed death requests to the access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Airocrack-ng

A

WIRELESS TOOL: Used to conduct protocol and password cracking of wireless encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Kismet

A

WIRELESS TOOL: An open source tool that contains a wireless sniffer, a network detector, and an intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Wifilite

A

WIRELESS TOOL: A wireless auditing tool that can be used to conduct a site survey to locate a rogue and hidden access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Rogue Access Point

A

WIRELESS TOOL: Any wireless access point that has been installed on a secure network without explicit authorization from a local network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

EAPHammer

A

WIRELESS TOOL: A python-based toolkit that can be used to steal EAP authentication credentials used in a WPA2-Enterprise network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

mdk4

A

WIRELESS TOOL: A wireless vulnerability exploitation toolkit that can conduct 10 different types of 801.11 exploitation techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Spooftooph

A

WIRELESS TOOL: Automates the spoofing or cloning of a Bluetooth device’s name, class, and address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Reaver

A

WIRELESS TOOL: A tool that conducts a brute force attack against an access point’s Wi-Fi Protected Setup (WPS) Pin to recover the WPA PSK

33
Q

WiGLE

A

WIRELESS TOOL: Wireless Geographic Logging Engine… A wireless OSINT tool that consists of a website and database dedicated to mapping and indexing all known wireless access point

34
Q

Fern

A

WIRELESS TOOL: Tests wireless networks by conducting password recovery through brute force and dictionary attacks, as well as session hijacking, replay, and on-path attacks

35
Q

SET

A

SOCIAL ENGINEERING TOOL: Social Engineering Toolkit… A python based collection of tools and scripts that are used to conduct social engineering during a penetration test

36
Q

BeEF

A

SOCIAL ENGINEERING TOOL: Browser Exploitation Framework… Used to assess the security posture of a target environment using cross-site attack vectors. Great tool for testing browsers and associated web servers and applications

37
Q

SSH

A

REMOTE ACCESS TOOL: Secure Shell… A command line tool that is used to remotely control another workstation over a LAN or WAN

38
Q

Netcat

A

REMOTE ACCESS TOOL: A command line utility used to read from or write to TCP, UDP, or Unix domain socket network connections

39
Q

ProxyChains

A

REMOTE ACCESS TOOL: A command line tool that enables penetration testers to mask their identity and/or source IP addresses by sending messages through proxy servers or other intermediaries

40
Q

Hashcat

A

CREDENTIAL TESTING TOOL: A modern password and hash cracking tool that supports the use of GPUs for parallel processing when conducting dictionary, brute force, and hybrid attacks

41
Q

Medusa

A

CREDENTIAL TESTING TOOL: A parallel brute-force tool that is used against network logins to attack services that support remote authentication

42
Q

Hydra

A

CREDENTIAL TESTING TOOL: A parallel brute-force tool that also supports a pw-inspect module to only attempt passwords from a dictionary that meets the minimum password requirements for a given system

43
Q

CeWL

A

CREDENTIAL TESTING TOOL: Used to generate word lists based on the automatic crawling of a website to collect worda and metadata from the site

44
Q

John the Ripper

A

CREDENTIAL TESTING TOOL: Password cracking tool that supports large sets of hashes and dictionary and brute force attacks

45
Q

Cain

A

CREDENTIAL TESTING TOOL: A legacy password cracking and hash dumping that can conduct network sniffing to identify hashes that may be vulnerable to cracking

46
Q

Patator

A

CREDENTIAL TESTING TOOL: A multi-purpose brute force tool that supports several different methods, including ftp, ssh, smb, vnc, and zip password cracking

47
Q

DirBuster

A

CREDENTIAL TESTING TOOL: A brute force tool run against a web application or server to identify unlisted directories and file names that may be accessed

48
Q

w3af

A

CREDENTIAL TESTING TOOL: Web Application Attack and Audit Framework… used to identify and exploit a large set of web-based vulnerabilities such as SQL injection and cross site scripting

49
Q

OWASP ZAP

A

WEB APPLICATION TOOL: open source web application security scanner and attack proxy used in automated and manual testing and identification of web application vulnerabilities

50
Q

Burp Suite

A

WEB APPLICATION TOOL: Used in raw traffic interception, inspection, and modification during automated testing, manual request modification, and passive web application analysis

51
Q

Gobuster

A

WEB APPLICATION TOOL: Brute force dictionary, file, and DNS identification tool used to identify unlisted resources in a web application

52
Q

Scout Suite

A

CLOUD TOOL: Open source tool written in Python that can be used to audit instances and policies created on multi-cloud platforms by collecting data using API calls

53
Q

CloudBrute

A

CLOUD TOOL: Used to find a target’s infrastructure, files, and apps across the top cloud service providers, including Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, and Linode

54
Q

Pacu

A

CLOUD TOOL: Exploitation framework used to assess the security configuration of an AWS account

55
Q

Cloud Custodian

A

CLOUD TOOL: Open source cloud security, governance, and management tool designed to help admins create policies based on different resource types

56
Q

OpenStego

A

STEGANOGRAPHY TOOL: Free steganography solution to conduct data hiding within a file and watermarking of files with invisible signatures to detect unauthorized file copying

57
Q

Steghide

A

STEGANOGRAPHY TOOL: Open source steganography tool used to conceal a payload by compressing, concealing, and encrypting its data in an image or audio file

58
Q

Snow

A

STEGANOGRAPHY TOOL: Command line tool that conceals a payload within the whitespace of an ASCII formatted text file in plaintext or encrypted format

59
Q

Coagula

A

STEGANOGRAPHY TOOL: Image synthesizer tool that can be used to create a sound file from a given image

60
Q

Sonic Visualizer

A

STEGANOGRAPHY TOOL: Open source application for viewing and analyzing the contents of music audio files

61
Q

TinEye

A

STEGANOGRAPHY TOOL: Website that can be used to conduct reverse image searches using image recognition

62
Q

Metagoofil

A

STEGANOGRAPHY TOOL: Python based tool that can search for metadata from public documents located on a target’s website

63
Q

Online SSL Checkers

A

STEGANOGRAPHY TOOL: Web application that can be used to test the validity, strength, and security of an SSL or TLS digital certificate for a given website

64
Q

OllyDBG

A

DEBUGGING TOOL: Linus debugger that can be used to analyze binary code found in 32-bit Windows applications

65
Q

Immunity Debugger

A

DEBUGGING TOOL: Built specifically for penetration testers to write exploits, analyze malware, and reverse engineer binary files using Python scripts and APIs

66
Q

GNU Debugger (GDB)

A

DEBUGGING TOOL: Open source cross-platform debugger for Unix, Windows, and MacOS

67
Q

WinDbg

A

DEBUGGING TOOL: Free debugging tool that is distributed by Microsoft for use in the Windows operating system

68
Q

Interactive Disassembler (IDA)

A

DEBUGGING TOOL: Commercial disassembler and debugging tool that generates assembly language source code from machine-executable code

69
Q

Covenant

A

DEBUGGING TOOL: Open source .NET framework focused on penetration testing that also has a development and debugging component

70
Q

SearchSploit

A

Tool used to find exploits available in Exploit-DB

71
Q

PowerSploit

A

A collection of PowerShell modules that create an extensive exploitation framework for use against Windows systems

72
Q

Responder

A

Command line tool in Kali Linux that is used to poison NetBIOS, LLMNR, and MDNS name resolution requests

73
Q

Empire

A

C2 framework that uses PowerShell for common post-exploitation tasks on Windows systems and Python for post-exploitation tasks on Linux systems

74
Q

Metasploit

A

Multi-purpose computer security and penetration testing framework that uses modularized attacks on known vulnerabilities

75
Q

mitm6

A

IPv6 DNS hijacking tool that attempts to set the malicious actor as the DNS server by replying to the DHCPv6 messages and then redirecting the victim to another malicious host

76
Q

CrackMapExec

A

Post exploitation tool to identify vulnerabilities in Active Directory environments

77
Q

TruffleHog

A

A Git secrets search tool that automatically crawls through a repository looking for accidental commits of secrets to the Git repository

78
Q

Censys

A

Website search engine tool used for finding hosts and networks across the internet with data about their configuration