Security tools Flashcards
The _____ command views and configures the host’s local routing table
route
The _____ command uses ICMP probes to report the round trip time (RTT) for hops between the local host and a host on a remote network on Windows.
tracert
The _____ command performs route discovery from a Linux host using UDP probes rather than ICMP.
traceroute
The _____ tool for Windows provides statistics for latency and packet loss along a route over a longer measuring period.
pathping
The ___ command is a TCP/IP command-line utility for viewing and modifying the local Address Resolution Protocol ____ cache, which contains recently resolved MAC addresses of Internet Protocol (IP) hosts on the network.
arp
The Linux-based tool _____ can run against the /dev/mem device file provided a kernel driver
memdump
_____ is a hex and disk editor for Windows that, when preinstalled on the host system, allows live capture of system memory.
WinHex
The common Linux tool ____ is a file conversion and copying tool that can copy entire disks, including hard disk images and memory dump files such as the /dev/mem device file. This makes it useful for easily and simply obtaining captures of a system’s memory.
dd
_____ is a tool for gathering open-source intelligence (OSINT) for a particular domain or company name. It works by scanning multiple public data sources and gathering emails, names, subdomains, IPs, URLs, and other relevant data.
theHarvester
The ____ tool is a port scanner that runs its scans through third-party websites to evade detection. This allows for stealthy port scanning.
scanless
____ is an open-source tool that has packet sniffing and injection as well as Denial of Service (DoS) testing features built right in.
hping
_____ is a commercial suite of Windows-compatible forensic investigation software and includes the capability for live memory capture and saves the data in a proprietary .eo1 file format.
FTK Imager
The ______ is widely used for system memory analysis and can install the pmem kernel driver, allowing tools such as memdump or dd to access the /dev/mem device memory file on Linux.
Volatility Framework
_____ is a framework designed for penetration test reporting and evidence gathering and can integrate with other tools, such as Metasploit, to run automated tests.
Sn1per
The _______, developed by the Open Web Application Security Project (OWASP), provides scanning tools and scripts for web application and mobile app security testing.
Zed Attack Proxy