Tools Flashcards

1
Q

What is WhatWeb?

A

WhatWeb is a Ruby-based web scanner. WhatWeb can fingerprint websites and their application stack by using its database of known application signatures. WhatWeb can also identify particular content management systems and blogging platforms (such as WordPress), web cameras and web application firewalls.

Verify that WhatWeb is installed by running ‘whatweb -h’ on the command line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is RustScan?

A

RustScan is a lightning-fast port scanner written in the Rust
programming language. It sends requests to ports on a target system and then listens for a response. The port scanner can then determine if the port is open, closed, or filtered

RustScan is faster than Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Nuclei?

A

Nuclei is a vulnerability scanner written in the Go programming language. Nuclei works by sending requests to targets defined by a YAML template file.

The first time you run Nuclei, it automatically creates a nuclei-templates directory in the user’s home folder and downloads all the publicly available Nuclei templates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is dirsearch?

A

dirsearch is a multithreaded tool used to find common paths
on web servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Linux Exploit Suggester 2?

A

The Linux Exploit Suggester 2 is a next-generation tool based
on the original Linux Exploit Suggester. Written in Perl, it includes several exploits you can use to potentially compromise vulnerable Linux kernel versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Gitjacker?

A

Gitjacker is a data-extraction tool that targets web applications whose .git directory has been mistakenly uploaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is pwncat?

A

pwncat is a Python-based command-and-control library for
capturing and interacting with remote shells. Once pwncat receives a shell connection from a remote compromised host, it acts as an exploitation platform from which commands can be sent and attacks can be launched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is LinEnum?

A

LinEnum is a bash script for enumerating local information on a Linux host. It’s used for finding system misconfigurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is unix-privesc-check?

A

The unix-privesc-check shell script collects information from a host in an attempt to find misconfigurations and ways to escalate privileges.

The script does not require any dependencies, which makes it convenient to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is arp-scan?

A

arp-scan sends Address Resolution Protocol (ARP) packets to hosts on a network and displays any responses it gets back.

ARP only operates on the local network, and cannot be routed.

arp-scan requires root privileges to run; this is because it uses functions to read and write packets that require elevated privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Nikto?

A

Nikto is a web scanning tool that performs banner grabbing and runs a few basic checks to determine if the web server uses security headers to mitigate known webvulnerabilities (such as cross-site scripting and UI redressing /clickjacking).

Nikto also sends requests to possible endpoints on the server by using its builtin wordlist of common paths.

Security headers indicate to browsers what to do when loading certain resources and opening URLs, protecting the user from falling victim to an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are fuzzers and for what are they used?

A

Fuzzers generate semi-random data to use as part of a payload. When sent to an application, these payloads can trigger anomalous behavior or reveal covert information. You can use fuzzers against web servers to find hidden paths or against local binaries to find vulnerabilities such as buffer overflows or DoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly