PT0-003 Tools

5.0(1)
studied byStudied by 15 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/69

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:30 PM on 7/18/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

70 Terms

1
New cards

Metasploit

a comprehensive penetration testing framework used for identifying vulnerabilities and exploiting them.

2
New cards

Netcat

a versatile networking utility that facilitates reading from and writing to network connections.

3
New cards

Nmap and NSE

a network scanner equipped with a scripting engine for network discovery and security auditing.

4
New cards

Impacket

a Python library designed for crafting and manipulating network packets at the protocol level.

5
New cards

CrackMapExec (CME)

a post-exploitation tool developed in Python and designed for penetration testing against networks. It can collect Active Directory information and conduct lateral movement through targeted networks.

6
New cards

Wireshark/tcpdump

network protocol analyzers used for capturing and inspecting packets to troubleshoot networks and security issues.

7
New cards

msfvenom

a tool within the Metasploit framework used for generating payloads for penetration testing.

8
New cards

Responder

inbuilt Kali tool for Link-Local Multicast name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) that responds to specific NetBIOS queries based on the file server request. By doing this, it can send out broadcast messages to a selected network.

9
New cards

hashcat

a tool for recovering passwords by brute-forcing hashes.

10
New cards

John the Ripper

a well-known password-cracking software used for dictionary attacks.

11
New cards

Hydra

a tool known for its capabilities in password cracking across multiple protocols and services.

12
New cards

BloodHound

a graphical tool for mapping out attack paths in Active Directory environments.

13
New cards

Medusa

a robust password cracking tool designed to test network authentication services.

14
New cards

Burp Suite

a suite of tools for web application testing that can proxy the flow of packets to allow for packet inspection and editing among other capabilities.

15
New cards

Mimikatz

a popular tool used for stealing passwords from windows devices.

16
New cards

Rubeus

a tool focused on the abuse and exploitation of Kerberos tickets in Active Directory environments.

17
New cards

Certify

a tool for managing and monitoring SSL certificates and related security aspects. It can be used to enumerate and abuse misconfigurations in Active Directory Certificate Services.

18
New cards

Seatbelt

a PowerShell script for offensive operations like credential harvesting and privilege escalation (system enumeration).

19
New cards

PowerShell/PowerShell Integrated Scripting Environment (ISE)

a command-line shell and scripting language for task automation and configuration management within a windows environment.

20
New cards

PsExec

a command-line tool that allows executing processes remotely on Windows systems without installing client software.

21
New cards

Evil-WinRM

a remote command execution tool designed specifically for Windows environments. Leverages the weaknesses WinRM to establish a foothold on a target system.

22
New cards

Living off the land binaries (LOLbins)

legitimate system binaries that can be repurposed for malicious activities.

23
New cards

TruffleHog

a tool used to search Git repositories for secrets and sensitive information that may have been committed inadvertently (such as secret keys).

24
New cards

Zed Attack Proxy (ZAP)

a penetration testing tool used to find vulnerabilities in web applications during development and testing.

25
New cards

Postman

a collaboration platform for API development that simplifies designing

26
New cards

sqlmap

an automated tool for detecting and exploiting SQL injection vulnerabilities in web applications.

27
New cards

Gobuster/DirBuster

tools used for brute-forcing directories and files on web servers.

28
New cards

Wfuzz

a tool designed for brute-forcing web applications. It can be used in various applications such as finding resources not in linked directories and fuzzing.

29
New cards

WPScan

a WordPress vulnerability scanner that checks for security vulnerabilities in WordPress installations.

30
New cards

Pacu

an open-source AWS exploitation framework, designed for offensive security testing against cloud environments

31
New cards

Docker Bench

a security assessment tool designed to evaluate Docker container environments against best security practices.

32
New cards

Kube-hunter

a Kubernetes security testing tool used to discover security issues and vulnerabilities in Kubernetes clusters.

33
New cards

Prowler

an open-source security tool designed to assess, audit, and enhance the security of AWS, GCP, and Azure.

34
New cards

ScoutSuite

a multi-cloud security auditing tool that assesses the security posture of cloud environments across various providers. Provides a snapshot of a cloud account at a given time.

35
New cards

WPAD

Web Proxy Auto-Discovery Protocol used for automatic proxy configuration in web browsers.

36
New cards

WiFi-Pumpkin

a framework for creating rogue Wi-Fi access points to perform man-in-the-middle attacks.

37
New cards

Aircrack-ng

a comprehensive suite of tools for assessing Wi-Fi network security.

38
New cards

WiGLE.net

a wireless network mapping service that collects and visualizes information about wireless networks worldwide.

39
New cards

InSSIDer

a Wi-Fi network scanner available for Windows and macOS to visualize and analyze Wi-Fi environments.

40
New cards

Kismet

a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs

41
New cards

Social Engineering Toolkit (SET)

a toolkit for simulating social engineering attacks to assess organizational vulnerabilities.

42
New cards

Gophish

an open-source phishing toolkit designed for performing simulated phishing attacks and security awareness training.

43
New cards

Evilginx

a man-in-the-middle attack framework designed to steal credentials and session cookies in phishing attacks.

44
New cards

theHarvester

an information-gathering tool used for discovering email addresses, sub-domains, hosts, employee names, and more

45
New cards

Maltego

an OSINT tool used for link analysis and visualization of relationships between entities from various sources by gathering and analyzing data on the internet.

46
New cards

Recon-ng

a web reconnaissance framework for information gathering and reconnaissance.

47
New cards

Browser Exploitation Framework (BeEF)

a penetration testing tool focused on targeting and exploiting web browsers.

48
New cards

Scapy

a powerful Python library used for packet manipulation and network analysis.

49
New cards

tcprelay

a suite of open-source utilities for editing and replaying previously captured network traffic.

50
New cards

MobSF

Mobile Security Framework for automated security analysis of mobile apps.

51
New cards

Frida

an open-source toolkit that allows developers and security professionals to inject code into running applications to monitor and change their behavior

52
New cards

Drozer

an Android security assessment framework for finding and exploiting security vulnerabilities in Android applications and devices.

53
New cards

Android Debug Bridge (ADB)

a command-line tool that allows communication with an Android device for debugging and development.

54
New cards

Bluecrack

a Bluetooth protocol stack security assessment tool.

55
New cards

Empire

an open-source post-exploitation framework and command and control (C2) tool that allows adversaries to expand their access in a victim's environment. It's designed for Windows environments.

56
New cards

PowerView

a PowerShell tool used for reconnaissance and data collection in Active Directory environments.

57
New cards

PowerUpSQL

a PowerShell toolkit designed for SQL Server attack and reconnaissance.

58
New cards

Bash

a Unix shell and command language interpreter.

59
New cards

Python

a high-level programming language known for its versatility and ease of use.

60
New cards

Breach and attack simulation (BAS)

provides an automated method to simulate, test, and validate the effectiveness of cybersecurity controls against potential threats.

61
New cards

Caldera

an automated adversary emulation system created by Mitre designed to simulate sophisticated cyber attacks.

62
New cards

Infection Monkey

an open-source security tool for testing network resilience and identifying potential attack vectors. Simulates cyber attacks on data centers and clouds.

63
New cards

Atomic Red Team

a library of adversary emulation plans and techniques used for testing and validating security defenses.

64
New cards

Netstat

a command-line tool used for displaying network connections and ports.

65
New cards

msbuild

the Microsoft Build Engine used for building .NET applications.

66
New cards

route

a command-line tool used for viewing and manipulating the IP routing table.

67
New cards

Covenant

a command and control framework for Red Team operations. uses just-in-time, in-memory, .NET compilation , and dynamic profiles to fool defensive detections.

68
New cards

sshuttle

a VPN-like tool that uses SSH to create a transparent proxy server between the local and remote networks.

69
New cards

Proxychains

a tool for routing TCP connections through proxy servers like TOR or any other.

70
New cards

PowerSploit

an open-source framework of PowerShell scripts and modules used by hackers to perform penetration testing and post-exploitation tasks