Tool Round Up Flashcards
WHOIS
TAG: OSINT
A query and response protocol that’s widely used for querying databases that store the registered users or assigness of an internet resource
* Anyone who buys a domain name is listed in WHOIS
USE
whois domain
Nslookup
TAG: OSINT
A network admin CLI tool for querying DNS to obtain the mapping between domain names and IPs, or other DNS records
* Most basic form finds IP with a given domain name
Use
nslookup domain
FOCA
TAG: OSINT
Fingerprinting Organizations with Collected Archives
* Used to find metadata and hidden information in collected documents from an org
theHarvester
TAG: OSINT
A program for gathering emails, subdomains, hosts, employee names, emails, PGP key entries, open ports, and service baners from servers
Use
theharvester -d domain[.]com -l 500 -b google
Shodan
TAG: OSINT
A website search engine for web cams, routers, servers, and other devices that are considered part of the IoT
* Search for anything that’s a vulnerable asset online
Maltego
TAG: OSINT
A piece of commercial software used for OSINT that visually connects the relationships between data points
* What things are linked to other things
* It can automate the querying of public sources of data and then compare it with other information from various sources
Recon-ng
TAG: OSINT
A system of modules to add additional features and functions for your use
* Cross-platform web recon framework
* Like metasploit but for recon shit
Censys
TAG: OSINT
A website search engine used for finding hosts and networks acros the internet with data about their configuration
* Like Shodan
* Cloud, shared, and other infrastructure used
* Finding vulns associated with targets you go after
Nikto
TAG: Scanning
A web vulnerability scanner that’s used to assess custom web apps that a company may have coded themselves
* Identifies outdated versions or server misconfigurations
* Vuln scanner for web servers
Use
perl nikto.pl -h [ IP address of target ]
OpenVAS
TAG: Scanning
Open-source vulnerability scanner that’s used to identify vulns and assign a risk rating for the targeted assets
* Scans entire network and shows results in a chart
* Very noisy and easy to detect
* Select just vulns you want to verify
Nessus
TAG: Scanning
A proprietary vulnerability scanner used to conduct basic, advanced, and compliance vuln scans to measure the effectiveness of the system’s security controls
* A lot like OpenVAS
* Commercial product with many plugins
Open SCAP
TAG: Scanning
Security Content Automation Protocol
* A tool created by NIST that’s used to create a predetermined security baseline that can be used to determine vulnerabilities or deviations in a system
* Choose baseline you want or create your own
SQLmap
TAG: Scanning
Open-source database scanner that searches for SQL injection vulnerabilities that can be exploited
* This is a Python script
* Focus is the SQL database beneath the website to see if vulnerable to injection
Use
python sqlmap.py -u website –batch
Wapiti
TAG: Scanning
A web app vulnerability scanner which automatically navigates a web app looking for areas it can inject data to target different vulnerabilities
* It runs various modules against a given web app
* Tests APIs more than anything inside web apps
Use
wapiti -u target
Brakeman
TAG: Scanning
Static code analysis security tool that’s used to identify vulnerabilities in apps written in Ruby on Rails
* Load code into the tool, then it assesses
* Helpful with known environment test
WPScan
TAG: Scanning
A WordPress site vulnerability scanner that identifies the plugins used by the website against a database of known vulnerabilities
Wireshark
TAG: Networking
Open-source protocol analysis tool that can conduct packet sniffing, decoding, and analysis
* Capture packets thru wireless or wired network and cap all traffic
* If plaintext, you’ve got it now
ScoutSuite
TAG: Scanning
Open-source tool written in Python that can be used to audit instances and policies created on multicloud platforms by collecting data with API calls
* Scans cloud servers
* Also relevant for cloud tools section
Tcpdump
TAG: Networking
A CLI protocol analysis tool that can conduct packet sniffing, decoding, and analysis
* Basically like wireshark but CLI
* Can filter through all the input easily to search with Python and grep
* Can be faster than wireshark with automation and scripting to find specific things in the traffic
Hping
TAG: Scanning
Open-source packet crafting tool used to exploit vulnerable firewall and IDS/IPS
* Can craft TCP, UDP, ICPM, or RAW-IP protocols
* Used during enumeration for fingerprinting
* Change the way you send packets and analyze the way they’re sent back, which helps identify which services and versions are being run
Aircrack-ng
TAG: Wireless
Open-source wireless exploitation toolkit that has
* airomon-ng: Monitor wireless frequencies to identify access points and clients
* airodump-ng: Captures network traffic and safe to pcap file
* aireplay-ng: Conducts deauth attack by sending spoofed deauth requests to the access point
* airocrack-ng: Conducts protocol and password cracking of wireless encrypting (brute forcing)
Kismet
TAG: Wireless
Open-source tool that contains a wireless sniffer, network detector, and IDS
* Works passively and doesn’t send packets into the network
* Stealthy for recon
* Cross-platform for all OS
Wifite
TAG: Wireless
Wireless auditing tool that can be used to conduct a site survey to locate rogue and hidden access points
* Audits WEP or WAP encrypted networks
* Also audits WPS
* Uses tools like aircrack-ng and Reaver in the background
* Automated wireless attack tool
Use
wifite
* Puts card in monitor mode, scans, and has you pick a number based on what it finds
Rogue Access Point
TAG: Scanning
Any wireless access point that’s been installed on a secure network without explicit authorization from a local network admin
* Wi-Fi pineapple can do this and cap all traffic
EAPHammer
TAG: Wireless
Python based toolkit that can be used to steal EAP authentication credentials used in a WPA2-Enterprise network
* Executes credential theft evil twin attacks against WPA and WPA2 EAP networks
* Goal is to steal victim RADIUS credentials by creating evil twin attack
* Pretend to be victimized client and auth to the trusted network
mdk4
TAG: Wireless
Wireless vulnerability exploitation toolkit that can conduct 10 typs fo 802.11 exploitation techniques
* Injects frames in order to exploit
* Used against 2.4 and 5 ghz bands
* Beacon flooding
* Auth DoS
* SSID probing and brute forcing
* Deauth and disassociation
* Michael countermeasures exploit
* EAPOL start and logoff packet injection
* Attacks for IEEE 802.11s mesh networks
* WIDS confusion confuse/abuse
* Packet fuzzer
* POC of WiFi protocol implementation vulnerability testing
Spooftooph
TAG: Wireless
Automates the spoofing or cloning of a Bluetooth device’s name, class, and address
* Can be used by attacker to pretend to be victim so the attacker’s BT device can hid in plain sight
* BT scanning software will only list one of each device it finds with same name
Reaver
TAG: Wireless
Tool that conducts brute force attack against an access point’s WPS PIN to recover the WPA PSK
* Once pin is found, PSK can be found easily
* Can reconfigure AP settings once it’s in
WiGLE
TAG: Wireless
Wireless Geographic Logging Engine
* A wireless OSINT tool that consists of a website and database dedicated to mapping and indexing all known wireless access points
Fern
TAG: Wireless
Tests wireless networks by conducting password recovery through brute force and dictionary attacks, as well as session hijacking, replay, and on-path attacks
* WEP, WPA, and WPS keys
* GUI based