Security Tools Part 2 (Network Tools) Flashcards
What command line tool is used to transfer data to or from a server using many different protocols?
curl
Note: HTTP, FTP, IMAP, POP3, SCP, SFTP, SMTP, TFTP, TELNET, LDAP, FILE)
What python script is used to gather emails, subdomains, hosts, employee names, open ports, and banners from different public sources?
the harvester
Note: This is a recon tool used by pen testers or analysts who want to identify possible weaknesses
What automated scanner can be used during a penetration test to enumerate and scan for vulnerabilities on a network?
sn1per
What utility is used to create an exploitation website that can perform open port scans in a stealthy manner?
scanless
What utility is used for DNS enumeration to locate all the DNS servers/entries for a given organization?
dnsenum
Note: This is an easier, automated process of doing nslookup/dig. It’s used by hackers/pen testers
What proprietary vulnerability scanner can remotely scan a computer or network for vulnerabilites?
Nessus
Note: This is an infrastructure scanner; routers, switches, hosts, servers
What open source software automates analysis of suspicious files?
Cuckoo
Note: This is sandbox environment used to see how a suspicious file will behave