Tools And Commands Flashcards
What is PILAR?
A Risk Analysis and Management Tool.
PILAR is the software that implements and expands Magerit RA/RM Methodology. It is designed to support the risk management process along long periods, providing incremental analysis as the safeguards improve. Its functionalities include mainly:
Quantitative and qualitative Risk Analysis and Management
Quantitative and qualitative Business Impact Analysis &Continuity of Operations
What are Examples of Risk Management Tools?
PILAR A1 Tracker Risk Management Studio IsoMetrix Sword Active Risk iTrak Certainty Software Resolver's ERM Software Isolocity Enablon
What is Group Policy Management Console (GPMC)?
It is a part of Windows Administrative Tools and is a scriptable interface to manage Group Policies.
Whate is ManageEngine ServiceDesk Plus?
It is a comprehensive ticketing system used in incident management, problem management, change management, and IT project management applications.
Name an Open Source Security Information and Event Management System (OSSIM)
AlienVault
What are examples of Ticketing System Tools?
AlienVault osTicket SolarWinds MSP IR-Flow Request Tracker for Incident Response (RTIR) IBM Resilient Incident Response Platform Freshdesk
What is buck-security?
It’s a collection of security checks for Linux. It allows incident handlers to identify the security status of a system
What is Kiwi Syslog Server?
A centralized and simplified log message management tool across various network devices and servers. It is used to centrally manage syslog messages, generate real-time alerts based on syslog messages, and perform advanced message filtering and message buffering
What is Splunk Light?
A tool for collecting, monitoring, and analyzing log files from servers, applications, or other sources. This tool will collect data from multiple sources and performs indexing, monitoring, reporting, and alerting. Alerts from Splunk Light can automatically trigger actions to send automated emails, execute remediation scripts, or post to RSS feeds.
What are examples of Incident Analysis and Validation Tools?
buck-security Kiwi Syslog Server Splunk Light Loggly InsightOps Logz.io Logmatic.io Graylog
What is Microsoft Baseline Security Analyzer (MBSA)?
A tool designed for IT professionals and helps small-and medium-sized businesses to determine their security state in accordance with Microsoft security recommendations. It lets incident handlers scan local and remote systems for missing security updates as well as common security misconfigurations. MBSA includes a graphical and command line interface that can perform local or remote scans of Microsoft Windows systems. To assess missing security updates, MBSA will only scan for missing security updates, update rollups and service packs available from Microsoft Update.
What are examples of tools for detecting missing security patches?
Microsoft Baseline Security Analyzer (MBSA) GFI LanGuard Symantec Client Management Suite MaaS360 Patch Analyzer Solarwinds Patch Manager Kaseya Security Patch Management Software Vulnerability Manager Ivanti Endpoint Security Patch Connect Plus Automox Prism Suite
What is MagicTree?
A report writing tool. MagicTree stores data in a tree structure. This is a natural way of representing the information that is gathered during a network test: a host has ports, which have services, applications, vulnerabilities, and so on.
What is KeepNote?
A note taking application that works on Windows, Linux, and MacOS X. With KeepNote, you can store your class notes, TODO lists, research notes, journal entries, paper outlines, and so on in a simple notebook hierarchy with rich-text formatting, images, and more. Using full-text search, you can retrieve any note for later reference.
What is FTK Imager?
A data preview and imaging tool that enables analysis of files and folders on local hard drives, CDs/DVDs, network drives, and examination of the content of forensic images or memory dumps.
What is R-Drive Image?
A potent utility that provides creation of disk image files for backup or duplication purposes. R-Drive restores the images on the original disks, on any other partitions, or even on a hard drive’s free space. It can be used to restore a system after heavy data loss caused by an operating system crash, virus attack, or hardware failure.
What are examples of Data Imaging Tools?
FTK Imager R-Drive Image EnCase Forensics Data Acquisition Toolbox RAID Recovery for Windows R-Tool R-Studio F-Response Imager
What is HashCalc?
A free tool used to compute multiple hashes, checksums, and HMACs for files, text, and hex strings
What is MD5 Calculator?
A tool used to calculate the MD5 hash value of the selected file.
What is HashMyFiles
A small utility that is used to calculate the MD5 and SHA1 hashes of one or more files in the system.
What is the ‘PsUptime’ command?
A Windows command to show the system uptime
What is the ‘Net Statistics’ command?
A Windows command used to show the system uptime
What is the ‘Uptime’ and ‘W’ command?
A Linux command used to show the system uptime
What is the ‘Netstat -ab’ command used for?
It’s a Windows command used to determine all the executable files for running processes.
What is ListDLLs?
It’s a Windows utility used to determine DLLs loaded into a process.
What is Pslist.exe?
It’s a Windows utility used to display basic information about the already running processes on a system, including the amount of time each process has been running.
What is the ‘Top’ command used for?
It’s a Linux command used to display system summary information as well as a list of processes or threads Linux kernel is currently managing.
What is the ‘w’ command?
It’s a Linux command used to display the current processes for each shell of each user.
What is the ‘ps’ command?
It’s a Linux command used to display information about the root’s currently running processes
What is the ‘pstree’ command?
It’s a Linux command used to display the processes on a system in the form of a tree
What is ‘Psloggedon’?
A Windows applet that displays both the locally logged on users and the users logged on via resources for either the local computer or a remote computer.
What is the ‘net session’ command?
A Windows command that helps to manage server connections. It is used without parameters ans it displays information about all logged in sessions of the local computer.
What is the ‘logonsessions’ command?
A Windows command that lists the currently logged-on sessions and if you specify the -p option it can provide you the information of processes running in each session.
What is the ‘who’ command?
A Linux command used to display the user that is currently logged on locally.
What is the ‘who am i/who -uH’ command?
These are both Linux commands. who am i is used to determine the currently logged on user, whereas who -uH displays the idle times for logged on users.
What is the ‘who -all/-a’ command?
A Linux command that displays all currently logged on users, local and remote
What is the ‘last’ command?
A Linux command that displays a history of logged on users, local and remote
What is the ‘lastlog’ command?
A Linux command that displays the last login times for system accounts, local and remote
What is the ‘W’ command?
A Linux command that displays summaries of system usage, currently logged on users, and logged on user activities
What is the ‘passwd’ file?
A Linux file containing user account information, including one-way encrypted passwords
What is the ‘nbtstat’ command?
A Linux command used to help troubleshoot NetBios resolution problems. When a network is functioning normally, NetBIOS over TCP/IP resolves NetBIOS names to IP Address
nbtstat -c: This option shows the contents of the NetBIOS name cache, which contains NetBIOS name-to-IP address mappings.
nbtstat -n: This displays the names that have been registered locally on the system by NetBIOS applications such as the server and redirector.
nbtstat -r: This command displays the count of all NetBIOS names resolved by broadcast and by querying a WINS server.
nbtstat -S: This option is used to list the current NetBIOS sessions and their statuses.
What is the ‘Netstat’ tool?
It’s a Windows tool that helps in collecting information about network connections operative.
netstat -a: Displays all active TCP connections as well as the TCP and UDP ports
netstat -e: Displays ethernet statistics.
netstat -n: Displays active TCP connections.
netstat -o: Displays active TCP connections and includes the PID.
netstat -p: Shows connections for the protocol specified.
netstat -r : Displays the contents of the IP routing table.
What is Cyber Triage?
An incident response software which helps incident responders and forensic investigators to determine if a host is compromised through simplified collection and analysis of endpoint data.
What is Process Explorer?
A Windows tool which shows the information about the handles and DLLs of the processes, which have been opened or loaded.
What are examples of tools used to collection volatile information?
PMDump ProcDump Process Dumper (PD) PsList Tasklist
What is Forensic Explorer?
A tool used to recover and analyze hidden and system files, deleted files, file and disk slack, and unallocated clusters. Forensic Explorer is used for preservation, analysis, and presentation of electronic evidence.
What is Forensic Toolkit (FTK)?
A tool used to deliver cutting edge analysis, decryption, and password cracking.
What is Event Log Explorer?
A software solution for monitoring, and analyzing events recorded in security, system, application, and other logs of Microsoft Windows OS.
What is OSForensics?
It helps discover relevant forensic data faster with high performance file searches and indexing as well as restores deleted files. It identifies suspicious files and activity with hash matching, drive signature comparisons and looks into emails, memory and binary data.
What is Helix3?
An cyber security solution integrated into the network, gives visibility across the entire infrastructure revealing malicious activities such as internet abuse, data sharing and harassment. Allows the user to isolate and respond to incidents or threats quickly through a central administration tool.
What is Autopsy?
A digital forensics platform and GUI to The Sleuth Kit and other forensics tools. It helps incident handlers to view file systems, retrieve deleted data, perform timeline analysis and web artifacts during an incident response.
What is EnCase Forensics?
A multi-purpose forensic platform. It can collect data from many devices and extract potential evidence. It generates an evidence report. Can assist in acquiring large amounts of evidence quickly.
What is Foremost?
A console program to recover files based on their headers, footers, and internal data structures.
What are examples of Forensic Analysis tools?
Forensic Explorer Forensic Toolkit (FTK) Event Log Explorer OSForensics Helix3 Autopsy EnCase Forensics Foremost Belkasoft Evidence Center RegScanner MultiMon Process Explorer Security Task Manager Memory Viewer Metadata Assistant HstEx XpoLog Log Management
What is TCP View?
A port monitoring tool. It shows detailed listings of all TCP & UDP endpoints on a system, including the local and remote addresses and the state of TCP connections. It provides subsets of the Netstat program that ships with WIndows.
What are examples of Port Monitoring Tools
TCP View CurrPorts dotcom-monitor PortExpert PRTG Network Monitor Nagios Port Monitor
What is Process Monitor?
A monitoring tool for Windows that shows real-time file system, registry, and process/thread activity. It combines the legacy Sysinternals utilities, Filemon and Regmon.
What are examples of Process Monitoring Tools
Process Monitor Process Explorer M/Monit ESET SysInspector System Explorer Security Task Manager HiJackThis Yet Another (remote) Process Monitor Process Network Monitor OpManager
What is jv16 Power Tools?
A PC system utility that works by cleaning out unneeded files and data, cleaning the Windows registry, automatically fixing system errors, and applying optimizations to a system. Allows users to scan and monitor the Registry.
What are examples of Registry Monitoring Tools?
jv16 Power Tools Regshot Reg Organization Registry Viewer RegScanner Registrar Registry Manager Active Registry Monitor MJ Registry Watcher Buster Sandbox Analyzer
What is Windows Service Manager (SrvMan)?
A service monitoring tool. You can use SrvMan’s CLI to Create services:
srvman.exe add [service name]
[display name] [/type:] [/start:] [/interactive:no] [/overwrite:yes]
Delete Services:
srvman.exe delete
Start/Stop/Restart services: srvman.exe start [/nowait] [/delay: ] srvman.exe stop [/nowait] [/delay: ] srvman.exe restart [/delay:]
install & start a legacy driver:
srvman.exe run [service name] [/copy:yes]
[/overwrite:no] [/stopafter:]
What are examples of Windows Service Monitoring Tools?
Windows Service Manager (SrvMan) Advanced Windows Service Manager Netwrix Service Monitor AnVir Task Manager Service+ Easy Windows Service Manager Nagios XI Windows Service Monitor PC Service Optimizer SMART Utility
What is Autoruns for Windows?
A Startup Program Monitoring Tool. It can autostart the location of any startup monitor, display what programs are configured to run during system bootup or login, and show the entries in the order Windows processes them.
What are examples of Startup Program Monitoring Tools?
Autoruns WinPatrol Autorun Organizer Quick Startup StartEd Pro Chameleon Startup Manager BootRacer Wintools.net: Startup Manager EF StartUp Manager PC Startup Master CCleaner Startup Delayer
What is Loggly?
An Event Logs Monitoring tool. Loggly automatically recognizes common log formats and gives a structured summary of all your parsed logs. It provides real-time monitoring, system behavior, and unusual activity.
What are examples of Event Logs Monitoring Tools?
Loggly SolarWinds Log & Event Manager Netwrix Event Log Manager LogFusion Alert Logic Log Manager EventTracker Log Manager Process Lasso Pro Splunk
What is Mirekusoft?
An Installation Monitoring tool. Mirekusoft automatically monitors what gets placed on your system and allows to unistall it completely.
What are examples of Installation Monitoring Tools?
Mirekusoft SysAnalyzer Advanced Uninstaller PRO Revo Uninstaller Pro Comodo Programs Manager
What is SIGVERIF?
A File and Folder Monitoring Tool. SIGVERIF is a Windows tool that comes with Windows 10/8/7. It searches for unsigned drivers on a system.
Steps to Identify an unsigned driver with SIGVERIF:
o Click Start → Run, type SIGVERIF, and then click OK.
o Click the Advanced button. Click Look for other files that are not digitally signed.
o Navigate to the Windows\System32\drivers folder, and then click OK.
o After Sigverif is finished running its check, it displays a list of all unsigned drivers installed on the computer. One can find the list of all signed and unsigned drivers found by Sigverif in the Sigverif.txt file in the %Windir% folder, typically the Windows folder.
What are examples of Files and Folder Monitoring Tools?
SIGVERIF Tripwire File Integrity Manager Netwrix Verisys PA File Sight CSP File Integrity Checker NNT Change Tracker AFIC (Another File Integrity Checker) Fsum Frontend OSSEC IgorWare Hasher
What is DriverView?
A Device Driver Monitoring Tool. DriverView displays the list of all device drivers currently loaded on the system. Additional information is displayed, such as, load address, description, version, product name, company
What are Examples of Device Driver Monitoring Tools?
DriverView Driver Booster Driver Reviver Driver Easy Driver Fusion Driver Genius Unknown Device Identifier Driver Magician DriverHive InstalledDriversList My Drivers Driver Agent Plus DriverPack
What is Capsa Network Analyzer?
A Portable Network Analyzer for both LANs and WLANs. It performs real-time packet capturing, 24/7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis.
What are Examples of Network Analyzer Tools?
Capsa Network Analyzer Wireshark Nessus NetResident PRTG Network Monitor GFI LanGuard NetFort LANGuardian CapMon Nagios XI Total Network Monitor
What is DNSQuerySniffer?
A network sniffer. DNSQuerySniffer shows the DNS queries sent on your system. For every DNS query, the following information is displayed: host name, port number, query ID, request type, request time, response time, duration, response code, number of records, and the consent of the returned DNS records.
What are examples of DNS Monitoring/Resolution Tools?
DNSQuerySniffer
DNSstuff
DNS Lookup Tool
Sonar