Tools for Performing Network Attacks

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

10 Terms

1
New cards

Metasploit

is a multi-purpose computer security and penetration testing framework that is used worldwide for both legitimate security analysis and unauthorized activities. Developed by Rapid7, it is intentionally modular, as it allows the attacker to mix and match scanners, exploits, and payloads into a single attack

2
New cards

Netcat

is a command-line utility used to read from, or write to, a TCP or UDP network connection. It can create or connect to a TCP server, act as a simple proxy or relay, transfer files, launch executables (such as a backdoor shell) when a connection is made, test services and daemons, and even scan ports.

3
New cards

Nmap

is the most widely used network scanner today. In addition to being used by network administrators to test the LAN, ? is the underlying scanning engine in a number of commercial and open-source vulnerability testing products.

4
New cards

Nmap Scripting Engine (NSE)

This core component of ? allows users to customize activity and automate the scanning process.

5
New cards

Impacket

An open-source collection of tools used when pentesting in a Windows environment. The ? library provides methods for several attacks such as an NTLM and Kerberos authentication attacks, pass the hash, credential dumping, and packet sniffing.

6
New cards

CrackMapExec (CME)

is a post-exploitation tool used to identify vulnerabilities in active directory environments.

7
New cards

Wireshark/tcpdump

are both packet capturing programs. ? is a powerful open-source protocol analysis tool that has the ability to decrypt many of the protocols used to conceal data, such as IPsec, Kerberos, and SSL/TLS. ? is often used to capture packets and Wireshark is used to analyze the captured packets.

8
New cards

msfvenom

A very flexible and useful component of the Metasploit framework dedicated to generating many different payloads for different platforms and architectures.

9
New cards

Responder

An on-path type tool that can be used to exploit name resolution on a Windows network

10
New cards

Hydra

Parallel brute-forcer for network logins. It supports parallel testing of several network authentications. ? comes bundled with a tool called pw-inspect that allows for analyzing a dictionary and printing only the ones that match password requirements.