Security Tools Part 2 (Network Tools) Flashcards

1
Q

What command line tool is used to transfer data to or from a server using many different protocols?

A

curl

Note: HTTP, FTP, IMAP, POP3, SCP, SFTP, SMTP, TFTP, TELNET, LDAP, FILE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What python script is used to gather emails, subdomains, hosts, employee names, open ports, and banners from different public sources?

A

the harvester

Note: This is a recon tool used by pen testers or analysts who want to identify possible weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What automated scanner can be used during a penetration test to enumerate and scan for vulnerabilities on a network?

A

sn1per

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What utility is used to create an exploitation website that can perform open port scans in a stealthy manner?

A

scanless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What utility is used for DNS enumeration to locate all the DNS servers/entries for a given organization?

A

dnsenum

Note: This is an easier, automated process of doing nslookup/dig. It’s used by hackers/pen testers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What proprietary vulnerability scanner can remotely scan a computer or network for vulnerabilites?

A

Nessus

Note: This is an infrastructure scanner; routers, switches, hosts, servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What open source software automates analysis of suspicious files?

A

Cuckoo

Note: This is sandbox environment used to see how a suspicious file will behave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly