Security Tools Flashcards

1
Q

What is tracert used for and what is it’s linux counterpart

A

Tracert is a network diagnostic tool for displaying possible routes and measuring transit delays of packets across an IP network

The Linux cmd is “trace route”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is nslookup and its linux counterpart

A

Used to determine the IP address associated with a domain name. Can be used to obtain the mail server settings for a domain and other DNS information.

The Linux cmd is “dig”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ipconfig used for and what is its linux computerpart

A

displays network configuration of the currently connected network devices and can modify DHCP and DNS settings

The Linux cmd is “ifconfig”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is Nmap

A

opensource network scanner that is used to discover hosts and services on a computer network by sending packets and analyzing their responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ping used for and its linux counterpart

A

utility used to determine if a host is reachable on an IP network

The Linux cmd is “path ping”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Hping

A

open source packet generator and analyzer for the TCP/IP protocol used for security auditing and listing of firewalls and networks

NMAP makes use of this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is netstat

A

utility that displays network connections for TCP , routing tables, and a number of network interfaces and network protocol statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is netcat

A

Used for reading from and writing to a network connection using TCP or UDP. Dependable back end that can be used directly or easily driven by other programs and scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is netcat used for

A

Banner grabbing of webservers
Shell connections and remote control of machines.
Blocked by most security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ARP

A

Utility for viewing and modifying the local address resolution protocol cache on a given host or server.

Layer 2 protocol, ARP messages and Mac address
ARP cache contains the Mac>IP Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the route command used for

A

used to view and manipulate the IP routing tables on a host or server

Every PC has an embedded router, and route allows you to interact with it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Curl

A

A tool used to transfer data to or from a server using any of the supported protocols including

(SCP, SMTP, TFTP, Telnet, LDAP, File)

Used by analysts when testing protocols over a network or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the harvester

A

Python script that is used to gather emails, subdomains, hosts, employee names, open ports, and banners from different public sources like search engines, and PGP key servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Sn1per

A

automated scanner that scan be used during pentest to enumerate vulnerabilities across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is scanless

A

utility that is used to create an exploitation websites that can perform open port scans in a more stealth manor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is DNSenum

A

utility that is used for DNS enumeration to locate all DNS servers and DNS entries for a targeted organization

17
Q

What is Nessus used for

A

Proprietary vulnerability scanner thatn can remotley scan a comptuter or network for vulnerablites

Infrastructure scanner for routers switches, hosts

18
Q

What is Cuckoo

A

open source sosftware for automating the analysis of suspicious files

program that allows files to be placed in a sandbox to see how they act when executed or acted upon

19
Q

Describe the head, tail and cat linux commands

A

head - will display first 10 lines of a file to the screen
Tail - will display the last 10 lines of a file to the screen
cat - will display the entire file to the screen

20
Q

What is grep and how is it used

A

CLI for searching plaintext datasets for lines that match a regular expression or pattern

21
Q

What is chmod used for

A

Changing access permissions of file system objects

22
Q

What is logger

A

CLI that is an easy wat to add messages to the /var/log/syslog file from the CLI

23
Q

what is SSH

A

Secure Shell - supporst encrypted data transfer between 2 pcs for secure logon, file transfers, and general purpose connections

24
Q

What is OpenSSL

A

software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end

allows for SSL/TLS tunneling for services

25
Q

What is tcpdump

A

CLI that captures and analyzes network traffic going through your system

26
Q

What is TCPreplay

A

Suite of free open-source utilities for editing and replaying previously captured network traffic

27
Q

What is dd used for

A

CLI utility used to copy disk images using a bit-by-bit copying process

28
Q

What is FTK Imager used for

A

Data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis with forensic tools are needed.

29
Q

What is memdump

A

linux command that dumps system memory to the standed output stream by skipping over holes in memory map

30
Q

what is winhex

A

Commercial disk editor and universal hexadecimal editor used for data recover and digital forensics

31
Q

What is autopsy

A

digital forensics platform and gui to the sleuthkit and other digital forensic tool

32
Q

what is metasploit

A

computer security tool that offers info about software vulnerabilities , ID signatures development and improves pen testing

33
Q

What is Beef

A

Browser exploitation framework - Tool that can hook one or more browsers and can use them as a beach head for launching various direct commands and further attacks against the system from within the browser context

34
Q

What is cain and abel

A

Password recovery tool that can be used through sniffing the network, cracking passwords through brute force, dictionary and cryptoanalysis attacks, record VOIP conversations, decode scrambled passwords, reveal PWs and analyze routing protocols

35
Q

What is jack the ripper

A

open source auditing and password recovery tool for many OSes, allows for the brute force and dictionary attacks