Tools Flashcards

1
Q

WHOIS

A

a query and response protocol used for querying databases that store registered users or assignees of an internet resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nslookup

A

Command-line tool for querying DNS to obtain mapping between domain names and IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fingerprinting Organizations with Collected Archives (FOCA)

A

Used to find metadata and hidden information in collected documents from an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

theHarvester

A

Program for gathering emails, subdomains, hosts, employee names, PGP key entries, open ports and service banners from servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shodan

A

Website search engine for web cameras, routers, servers and other devices that considered part of the Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maltego

A

Commercial software for conducting OSINT that visually helps connect those relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Recon-ng

A

Cross platform web reconnaissance framework that uses a system of modules to add additional features and functions for your use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Censys

A

Website search engine used for finding hosts and networks across the internet with data and their configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nikto

A

Web vulnerability scanner that is used to assess custom web applications that a company may have coded themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OpenVAS

A

Open source vulnerability scanner that is used to identify vulnerabilities and assign a risk rating for those targeted assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nessus

A

A proprietary vulnerability scanner that is used to conduct basic, advanced and compliance vulnerability scans to measure the effectiveness of the systems security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQLmap

A

An open-source database scanner that searches for SQL injection vulnerabilities that can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open SCAP (Security Content Automation Protocol)

A

A tool created by NIST that is used to create a predetermined security baseline to determine vulnerabilities or deviations in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wapiti

A

Web Application vulnerability scanner which will automatically navigate a web app looking for areas where it can inject data to target different vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WPScan

A

A WordPress site vulnerability scanner that identifies the plugins used by the website against a database of known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brakeman

A

Static code analysis security tool that is used to identify vulnerabilities in applications written in Ruby on Rails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ScoutSuite

A

Open-source tool written in Python that can be used to audit instances and policies created on multicloud platforms by collecting data using API calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Wireshark

A

An open-source protocol analysis tool that can conduct packet sniffing, decoding, and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Tcpdump

A

A command-line protocol analysis tool that cna conduct packet sniffing, decoding, and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hping

A

An open-source packet crafting tool used to exploit vulnerable firewalls and IDS/IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Aircrack-ng

A

Open-source wireless exploitation tool kit consisting of airomon-ng, airodump-ng, aireplay-ng, and airocrack-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Airomon-NG

A

User to monitor wireless frequencies to identify access points and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Airodump-NG

A

Used to capture network traffic and save it to a PCAP file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Airocrack-NG

A

Used to conduct protocol and password cracking of wireless encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Kismet

A

Open-source tool that contains a wireless sniffer, network detector, and IDS

26
Q

Wifite

A

Wireless auditing tool that can be used to conduct a site survey to locate rogue and hidden access points

27
Q

EAPHammer

A

Python-based toolkit that can be used to steal EAP authentication credentials used in a WPA2-Enterprise network

28
Q

mdk4

A

Wireless vulnerability exploitation toolkit that can conduct 10 different types of 802.11 exploitation techniques

29
Q

Spooftooph

A

Automates the spoofing or cloning of a Bluetooth device’s name, class, and address.

30
Q

Reaver

A

A tool that conducts a brute-force attack against an access point’s Wi-Fi Protected Setup (WPS) PIN to recover the WPA PSK

31
Q

Wireless Geographic Logging Engine (WiGLE)

A

Wireless OSINT tool that consists of a website and database dedicated to mapping and indexing all known wireless access points

32
Q

Fern

A

Tests wireless networks by conducting password recovery through brute force and dictionary attacks, as well as session hijacking, replay and on-path attacks

33
Q

Social Engineering Toolkit (SET)

A

Python-based collection of tools and scripts that are used to conduct social engineering during a penetration test

34
Q

Browser Exploitation Framework (BeEF)

A

Used to assess the security posture of a target environment using cross-site attack vectors

35
Q

Netcat (nc)

A

Command-line utility used to read from or write to TCP, UDP, or Unix domain socket network connections

36
Q

Ncat

A

Improved version of Netcat which can also act as a proxy, launch executable, transfer files, and encrypt all communications to and from the victim machine

37
Q

ProxyChains

A

Command-line tool that enables pen testers to mask their identity and/or source IP address by sending messages through proxy servers or intermediaries

38
Q

Hashcat

A

Modern password and hash cracking tool that supports the use of GPUs for parallel processing when conducting dictionary, brute force, and hybrid attacks

39
Q

Medusa

A

Parallel brute-force tool that is used against network logins to attack services that support remote authentication

40
Q

Hydra

A

Parallel brute-force tool that also supports a pw-inspect module to only attempt passwords from a dictionary that meets the minimum password requirements for a given system

41
Q

CeWL

A

Used to generate word lists based on the automatic crawling of a website to collect words and metadata from the site

42
Q

John the Ripper

A

A password cracking tool that supports large sets of hashes and dictionary and brute-force attacks

43
Q

Cain

A

Legacy password cracking and hash dumping tool that can conduct network sniffing to identify hashes that may be vulnerable to cracking

44
Q

Patator

A

Multipurpose brute-force tool that supports several different methods, including ftp, ssh,smb,vnc, and zip password cracking

44
Q

Mimikatz

A

Tool that gathers credentials by extracting key elements from the memory of a system such as clear text passwords, hashes, and PIN codes

45
Q

DirBuster

A

Brute-force tool run against a web application or server to identify unlisted directories and file names that maybe accessed

46
Q

Web Application Attack and Audit Framework (w3af)

A

Tool used to identify and exploit a large set of web-based vulnerabilites, such as SQL injection and cross-site scripting

47
Q

OWASP ZAP (Zed Attack Proxy)

A

Open-source web application security scanner and attack proxy used in automated and manual testing and identification of web application vulnerabilities

48
Q

Burp Suite

A

Used in raw traffic interception inspection, and modification during automated testing, manual request modification and passive web application analysis

49
Q

Gobuster

A

Brute-force dictionary, file, and DNS identification tool used to identify unlisted resources in a web application

50
Q

CloudBrute

A

Used to find a target’s infrastructure, files, and apps across the top cloud service providers, including Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, and Linode

51
Q

Pacu

A

Exploitation framework used to assess the security configuration of an Amazon Web Services (AWS) account

52
Q

Cloud Custodian

A

Open-Source cloud security, governance, and management tool designed to help admins create policies based on different resource types.

53
Q

OpenStego

A

Free steganography solution to conduct data hiding within a file and watermarking of files with invisible signatures to detect unauthorized file copying

54
Q

Steghide

A

Open-source stenography tool used to conceal a payload by compressing, concealing and encrypting its data in an image or audio file

55
Q

Snow

A

command-line steganography tool that conceals a payload withing the whitespace of ans ASCII formatted text file in plaintext or encrypted format

56
Q

Coagula

A

Image synthesizer tool that can be used to create a sound file from a given image

57
Q

Sonic Visualizer

A

An open-source application for viewing and analyzing the contents of music audio files

58
Q

Metagoofil

A

Python-based tool that can search for metadata from public documents located on a target’s website

59
Q
A