Section 24: Tools Flashcards

1
Q

Wapiti

A

A web application vulnerability scanner which will automatically navigate a web app looking for areas where it can inject data to target different vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPScan

A

A WordPress site vulnerability scanner that identifies the plugins used by the website against a database of known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Brakeman

A

A static code analysis security tool that is used to identify vulnerabilities in applications written in Ruby on Rails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kismet

A

An open-source tool that contains a wireless sniffer, a network detector, and an intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wifite

A

A wireless auditing tool that can be used to conduct a site survey to locate rogue and hidden access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

mdk4

A

A wireless vulnerability exploitation toolkit that can conduct 10 different types of 802.11 exploitation techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fern

A

Tests wireless networks by conducting password recovery through brute force and dictionary attacks, as well as session hijacking, replay, and onpath attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ProxyChains

A

▪ A command-line tool that enables penetration testers to mask their identity and/or source IP address by sending messages through proxy servers or other intermediaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Patator

A

A multi-purpose brute-force tool that that supports several different methods, including ftp, ssh, smb, vnc, and zip password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Patator

A

A multi-purpose brute-force tool that that supports several different methods, including ftp, ssh, smb, vnc, and zip password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Snow

A

A command-line steganography tool that conceals a payload within the whitespace of an ASCII formatted text file in plaintext or encrypted format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Coagula

A

An image synthesizer tool that can be used to create a sound file (.wav) from a given image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OllyDbg

A

▪ A Linux debugger that can be used to analyze binary code found in 32-bit
Windows applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GNU Debugger (GDB)

A

An open-source, cross-platform debugger for Unix, Windows, and MacOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CrackMapExec

A

A post-exploitation tool to identify vulnerabilities in Active Directory environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TruffleHog

A

▪ A Git secrets search tool that automatically crawls through a repository
looking for accidental commits of secrets to the Git repository