Security Tools Flashcards

1
Q

What does the traceroute command do?

A

The traceroute command allows you to map the entire path between two devices so that you can know exactly what routers are between point A and point B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is TTL in relation to traceroute?

A

TTL (time to live)
This is the amount of hops a packet can go through.
Hops are hops between different routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do the nslookup and dig commands do?

A

These are useful for looking up information from dns servers.
The information is names and IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are ipconfig and ifconfig?

A

Commands that can be used to find your IP address and network adapter information.
These ping your local router/gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is pathping?

A

A windows command that combines both traceroute and ping.
First it runs a traceroute to build a map.
Next it does pings on each hop and measures round trip time and packet loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is netstat?

A

Network Statistics

Shows which devices our local machine is communicating to, and which devices are communicating to us.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command would you use to see the local arp table?

A

arp -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What command would you use to see a device’s routing table in windows and linux?

A

Linux: “netstat -r”
Windows: “route print”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the curl command?

A

curl means client URL

It is used for grabbing the raw data of a webpage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is hping?

A

hping takes the idea of a ping and goes much further with it.
unlike a normal ping, hping allows you to heavily modify the packet you wish to send, and designate a port to send it to as well.
You can use this for wide scanning of ports too like nmap by specifying a range of ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is theHarvester used for?

A
Gathering OSINT (open source intelligence)
Also provides the ability to do a DNS brute force on a certain domain.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is sn1per?

A

This is a framework that combines many different recon tools into a single framework.

You can use one single query and get one set of output but run many different types of reconnaissance from many different tools at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the command scanless do in linux?

A

This allows you to run port scans from a different host.

Basically a port scan proxy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the “dnsenum” command do? think “dns-enum”

A

This command is used for enumerating DNS information and finding host names.
Many services and hosts are listed in DNS and this command lets you do enumeration to view them.

Basically performs a brute force against the DNS to find any extra domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the tool Cuckoo used for?

A

This is a sandbox for malware.

You can run programs inside of it and test them in a safe environment for malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When looking at a file’s permissions using “ls -l” what 3 “groups” would have which permissions if it read:

-rw-r–r–

A

The owner(first section) would have read and write permissions
The group associated with that file would have read permissions.
All others on the machine would have read permissions.

The order here is owner-group-others

17
Q

If you executed this command “chmod 740 file.txt” which permissions would be applied?

A

The owner would have full permissions on the file to read write and execute.
The group for that file would have just read permissions.
Everyone else would have no permissions.

18
Q

What is the command logger used for?

A

The logger command will add information into the syslog in the operating system.
Usage:
logger “This information will be added to the syslog”
And then it really will be added to the syslog.

19
Q

What is the .ps1 file extension commonly associated with?

A

Powershell scripts.

20
Q

What is OpenSSL used for?

A

This is a toolkit and crypto library for SSL/TLS
You can use it to build certificates and manage SSL/TLS certificates on your system.
Can manage certificate signing requests(CSRs) and certificate revocation lists(CRLs)

Also has support for performing many different hashing functions and you can of course use it for encrypting and decrypting.

21
Q

What is tcpdump used for?

A

tcpdump has similar properties to wireshark but operates in the command line.
This would be a great solution if you don’t have access to a GUI.
This can capture packets and display the packets on the screen in real time just like wireshark.
You can also write these captures to a file and save them.

22
Q

What is Tcpreplay used for?

A

This allows us to take the packets captured in a packet capture and replay them back onto the network.
This allows us to take the information that we have gathered and simply send it right back out our NIC so that other devices on the network can see it as well.

This would be a great way of testing your IPS to see if it could find some malicious traffic in transit, if you captured some.
Also a great way to test firewall rules, as well as testing the performance of network devices on your network and how they handle large data.

23
Q

What is the dd command used for?

A

This is used for digital forensics.
Allows you to create a bit for bit copy of a drive.
Used by many forensic tools.

the command for doing this would look like this:

Creating an image:
dd if=/dev/sda of=/tmp/sda-image.img
^original ^copy

Restoring from an image:
dd if=/tmp/sda-image.img of=/dev/sda
^copy ^output where you want to restore

24
Q

What is the utility memdump used for?

A

Forensic Tool for dumping information in memory

This will take all of the information currently existing in system memory and send it to a location on your system.

Will typically be copied to another host across the network using netcat,stunell,openssl,etc.

25
Q

What is WinHex used for?

A

This is a 3rd party windows editor for allowing you to view and edit information in hexadecimal.

You can pull out information from a file, from memory, etc and not only view but EDIT that file or information as well.

There is also disk cloning capabilities built in.
You can also do secure wipes.

26
Q

What is FTK imager?

A

Think windows when you see this
A forensic drive imaging tool in windows.
An imaging tool that can mount drives, image drives, or perform file utilities in a windows executable.
You can even read encrypted drives as long as you have the password.
Widely supported in many forensics tools, you can read and write in other image formats, like if you are using dd, ghost, expert witness, etc.

27
Q

What is the tool “autopsy” used for.

A

This is a tool for once we have already gotten an image of a drive and we want to search through it for other pieces of information.

Allows us to view and extract many different data types:
Downloaded files
Browser history and cache
Emails
Databases
Much more
28
Q

What is the social engineer toolkit? (SET)

A

This is like metasploit but for social engineering.

Contains a ton of social engineering tools in one framework.