Pentest Tools Flashcards

1
Q

OpenVAS

A

vulnerability scanner
assigns risk rating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nessus

A

commercial vuln scanner
assigns risk rating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

W3AF

A

web app attack and audit framework
identifies and exploits large set of web based vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

mimikatz

A

gathers credentials by extracting elements from system such as cleartext passwords, hashes and pin codes.
common for pass the hash (NTLM relay and kerberos attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

hashcat

A

password and hash cracking tool
one of the fastest pw recovery tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

medusa

A

parallel brute force tool for network logins that support remote login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hydra

A

parallel brute force tool that only attempts passwords from dictionary that meet the minimum pw requirements for that site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CeWL

A

creates custom word list and dictionary by collecting words and metadata from the site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Patator

A

multipurpose brute force tool that supports several different methods of PW cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DirBuster

A

brute force tool to identify unlisted directories and file names that may be accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ollydbg

A

linux debugger to analyze binary on 32 bit windows apps
helpful if you don’t have access to source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IDA

A

interactive disassembler
commercial disassembly and debug tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Immunity debugger

A

debugger built specifically for pen testers to write exploits, analyze malware, and reverse engineer binary files using python scripts and APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AFL

A

american fuzzy lop
fuzzing tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

findsecbugs

A

used to do security audits of java apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

sonarqube

A

performs automatic static code reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

YASCA

A

yet another source code analyzer
software code scanner using plug ins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

censys

A

website search engine for finding hosts and networks across the internet with data about their config. can find cloud services
similar to shodan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

shodan

A

search engine to find IoT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FOCA

A

fingerprinting organizations with collected archives
finds metadata
WINDOWS ONLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

kismet

A

wireless exploitation suite that can scan, sniff, and defend as an IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WiFite

A

wireless auditing tool that can locate rogue and hidden access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Airomon-NG

A

monitor wireless frequencies to identify access points and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Airodump-ng

A

capture network traffic and save to PCAP file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

aireplay-ng

A

conducts deauthentication attacks by sending spoofed deauth requests to access point

26
Q

airocrack-ng

A

conducts protocol and PW cracking of wireless encryption

27
Q

OWASP ZAP

A

web app security scanner and attack proxy for web app vulnerabilities

28
Q

Burp suite

A

graphical tool for web app scanning

29
Q

BeEF

A

browser exploitation framework
social engineering tool focused on the web browser

30
Q

ncat

A

CL tool for reading, writing, redirecting, and encrypting data on a network
new version of net cat

31
Q

netcat

A

swiss army knife
CL tool for reading, writing, redirecting, and encrypting data on a network

32
Q

proxychains

A

CL tool that allows you to mask your identity and/or source IP address by sending messages through proxy servers or other intermediaries

33
Q

drozer

A

complete security audit and attack framework for android

34
Q

powersploit

A

collection of powershell modules for pentesting, post exploitation

35
Q

searchsploit

A

tool used to find exploits available in exploit-DB

36
Q

responder

A

CL tool in Kali used to poison netbios, LLMNR, and MDNS name resolution requests

37
Q

impacket

A

collection of python classes for working with network protocols and the exploitation of windows systems

38
Q

Route

A

evasion tool

39
Q

hopper

A

used for decompilation

40
Q

foremost
FTK
Encase
Tableau

A

forensics tools

41
Q

bloodhound

A

explores active directory trust relationships and abuse rights on AD objects

42
Q

metagoofil

A

search metadata associated with public documents on target’s website

43
Q

open SCAP

A

vuln scanner created by NIST that is used to create a predetermined baseline for finding vulnerabilities and deviations in a system

44
Q

Wapiti

A

web app vuln scanner that automatically navigates a web app looking for areas to inject data

45
Q

brakeman

A

static code analysis for ruby on rails

46
Q

tcpdump

A

conducts packet sniffing, decoding, and analysis

47
Q

EAPHammer

A

used to steal EAP authentication credentials using WPA2-enterprise network
wireless tool

48
Q

mdk4

A

wireless vuln exploit toolkit that can conduct 10 types of 802.11 exploit techniques

49
Q

reaver

A

brute force tool for WPS pin to recover wpa psk

50
Q

empire

A

c2 framework that uses powershell for common post exploit task on windows and python for post exploit tasks on linux
easily identifies

51
Q

fern

A

tests wireless networks by conducting PW recovery through brute force and dictionary attacks as well as hijacking, replay and on path attacks
GUI

52
Q

go buster

A

brute force dictionary, file and DNA id tool to identify unlisted resources on web app

53
Q

openstego

A

stego tool to hide data in a file and watermark file with invisible signature to detect unauthorized copying

54
Q

steghide

A

conceals payload into image or audio file

55
Q

sonic visualizer

A

app for viewing and analyzing contents of music audio files

56
Q

tineye

A

website used to reverse image searches

57
Q

covenant

A

.net framework focused on pen testing that also has a development and debugging component
also used as a c2 platform

58
Q

mitm6

A

ipv6 dns hacking tool. replies to DHCPv6 messages and redirects the victim to another malicious host

59
Q

crack map exec

A

post exploit tool to identify vulnerabilities in AD environments

60
Q

trufflehog

A

git secrets search tool that crawls through repositories looking for accidental commits of secrets to git repositories.