Sybex - Tools Flashcards

Be able to state the purpose and use case for all of the tools in this list

1
Q

WHOIS

A

OSINT: gather info from public records about domain ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nslookup

A

OSINT: Help identify IP address associated with an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

theHarvester

A

OSINT: Scours search engines and other sources to find email addresses, employee names, and infrastructure details about an org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Recon-ng

A

OSINT: Modular web reconnaissance framework that organizes and manages OSINT work. (Need more info on this)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Censys

A

OSINT: web-based tool that probes IP addresses across the internet then provides pen testers with access to that info through a search engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FOCA

A

OSINT: Fingerprinting Organizations with Collective Archives; Find Metadata in Office Documents, PDFs, and other common file formats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Shodan

A

OSINT: Specialized Search Engine for discovery of vulnerable IoT devices from public sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Maltego

A

OSINT: commercial product that assists with visualization of data gathered via OSINT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NMAP

A

OSINT: Port Scanning and Network Mapping tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Nessus

A

VulnScan: commercial tool used to scan wide variety of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OpenVAS

A

VulnScan: OSS network vuln scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SqlMap

A

VulnScan: automate Sql injection attacks against web apps with database back ends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Nikto, Wapiti, W3AF

A

VulnScan: OSS Web Application vuln scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPScan

A

VulnScan: Web app testing tool designed to work with websites running WordPress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SCAP

A

VulnScan: (Security Content Automation Protocol) Set of tools designed to help orgs manage compliance and security standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SET

A

SocialEngineer: (Social Engineering Toolkit) Framework for automating the social engineering process; sending spearphishing emails, hosting fake websites, collecting credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BeEF

A

SocialEngineer: (Browser Exploitation Framework) automated toolkit for using social engineering to take over a victim’s web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hashcat

A

CredentialTest: password cracking and reverse-engineer hashed password tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

John the Ripper

A

CredentialTest: password cracking and reverse-engineer hashed password tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hydra

A

CredentialTest: password cracking and reverse-engineer hashed password tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Medusa

A

CredentialTest: password cracking and reverse-engineer hashed password tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Patator

A

CredentialTest: password cracking and reverse-engineer hashed password tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cain

A

CredentialTest: password cracking and reverse-engineer hashed password tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CeWL

A

CredentialTest: custom wordlist generator that searched websites for keywords that may be used in password-guessing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Mimikatz

A

CredentialTest: Retrieve creds from memory on Windows machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DirBuster

A

CredentialTest: brute-forcing tool to enumerate files and directories on web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Immunity Debugger

A

Debugger/SoftwareTest: supports pentesting and reverse engineering malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

GDB

A

Debugger/SoftwareTest: OSS debugger for Linux for use with many programming languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

OllyDbg

A

Debugger/SoftwareTest:Windows debugger that works on binary code at the assembly language level

30
Q

WinDbg

A

Debugger/SoftwareTest:Windows Specific debug tool created by Microsoft

31
Q

IDA

A

Debugger/SoftwareTest:commercial debugging tool for use on Windows/Mac/Linux

32
Q

Brakeman

A

Debugger/SoftwareTest:static software analysis tool for scanning Ruby on Rails apps

33
Q

Covenant

A

Debugger/SoftwareTest:software security testing tool for testing .NET apps

34
Q

TruffleHog

A

Debugger/SoftwareTest: scans through code repos for accidentally published secrets

35
Q

Wireshark

A

Network Testing: protocol analyzer, eavesdrop on network traffic

36
Q

Hping

A

Network Testing: command line tool to artificially generate network traffic

37
Q

Aircrack-ng

A

Network Testing: wireless network security testing tool

38
Q

WiFite

A

Network Testing: wireless network security testing tool

39
Q

mdk4

A

Network Testing: wireless network security testing tool

40
Q

Fern

A

Network Testing: wireless network security testing toolK

41
Q

Kismet

A

Network Testing: wireless network security testing tool

42
Q

Rogue Wireless Access points

A

Network Testing: used to attract connections from people

43
Q

EAPHammer

A

Network Testing: used to conduct evil twin attacks against WPA2-Enterprise wireless networks

44
Q

Reaver

A

Network Testing: conduct attacks against networks that support WPS

45
Q

Spooftooph

A

Network Testing: bluetooth attacks

46
Q

Wireless Geographic Logging Engine (WiGLE)

A

Network Testing: open database of wireless network info collected by community and published for open access

47
Q

Online SSL Checkers

A

Network Testing: determine if websites are susceptible to TLS/SSL vulnerabilities

48
Q

SSH

A

Remote Access: secure encrypted communication

49
Q

Ncat and Netcat

A

Remote Access: easy way to read and write data over network connections

50
Q

ProxyChains

A

Remote Access: allows testers to force connections through a proxy server where they may be inspected and altered before being passed onto final destination

51
Q

Metasploit

A

Exploitations: most popular exploitation framework that supports thousands of plug-ins

52
Q

SearchSploit

A

Exploitations: command-line tool to search through db of known exploits

53
Q

PowerSploit

A

Windows-centric sets of Powershell Scripts to automate penetration testing tasksWindows-centric sets of Powershell Scripts to automate penetration testing tasks

54
Q

Empire

A

Exploitations:Windows-centric sets of Powershell Scripts to automate penetration testing tasks

55
Q

Responder

A

Exploitations: toolkit used to answer NetBIOS queries from Windows Systems

56
Q

Impacket

A

Exploitations: set of network tools that provide low-level access to network protocols

57
Q

Mitm6

A

Exploitations: tool used to conduct attacks against IPv6 networks

58
Q

CrackMapExec

A

Exploitations: set of tools to evaluate AD environment after gaining network access

59
Q

OpenSteg

A

Steganography: general purpose tool to hide text within images and other binary files

60
Q

Steghide

A

Steganography: general purpose tool to hide text within images and other binary files

61
Q

Coagula

A

Steganography: used to embed text within audio files

62
Q

Sonic Visualizer

A

Steganography: audio analysis tool to detect alterations that may have been made by steganography tools

63
Q

Snow

A

Steganography: Uses white space and tabs in a document to hide information

64
Q

TinEye

A

Steganography: reverse image search tool that allows researchers to identify the original image when they suspect steg is being used

65
Q

Metagoofil

A

Steganography: extract metadata from a large variety of file types

66
Q

ScoutSuite

A

CloudTools: Cloud Security and Auditing tool

67
Q

CloudBrute

A

CloudTools: scanner used to identify cloud components used by organizations

68
Q

Pacu

A

CloudTools: cloud exploitation framework used specifically for AWS environments

69
Q

Cloud Custodian

A

CloudTools: rule enforcement engine to ensure consistent application of security rules across environments

70
Q

ExifTool

A

OSINT: easily see metadata on a file