1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Metasploit
is a multi-purpose computer security and penetration testing framework that is used worldwide for both legitimate security analysis and unauthorized activities. Developed by Rapid7, it is intentionally modular, as it allows the attacker to mix and match scanners, exploits, and payloads into a single attack
Netcat
is a command-line utility used to read from, or write to, a TCP or UDP network connection. It can create or connect to a TCP server, act as a simple proxy or relay, transfer files, launch executables (such as a backdoor shell) when a connection is made, test services and daemons, and even scan ports.
Nmap
is the most widely used network scanner today. In addition to being used by network administrators to test the LAN, ? is the underlying scanning engine in a number of commercial and open-source vulnerability testing products.
Nmap Scripting Engine (NSE)
This core component of ? allows users to customize activity and automate the scanning process.
Impacket
An open-source collection of tools used when pentesting in a Windows environment. The ? library provides methods for several attacks such as an NTLM and Kerberos authentication attacks, pass the hash, credential dumping, and packet sniffing.
CrackMapExec (CME)
is a post-exploitation tool used to identify vulnerabilities in active directory environments.
Wireshark/tcpdump
are both packet capturing programs. ? is a powerful open-source protocol analysis tool that has the ability to decrypt many of the protocols used to conceal data, such as IPsec, Kerberos, and SSL/TLS. ? is often used to capture packets and Wireshark is used to analyze the captured packets.
msfvenom
A very flexible and useful component of the Metasploit framework dedicated to generating many different payloads for different platforms and architectures.
Responder
An on-path type tool that can be used to exploit name resolution on a Windows network
Hydra
Parallel brute-forcer for network logins. It supports parallel testing of several network authentications. ? comes bundled with a tool called pw-inspect that allows for analyzing a dictionary and printing only the ones that match password requirements.