PT0-003 Tools

studied byStudied by 14 people
5.0(1)
Get a hint
Hint

Metasploit

1 / 69

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

70 Terms

1

Metasploit

a comprehensive penetration testing framework used for identifying vulnerabilities and exploiting them.

New cards
2

Netcat

a versatile networking utility that facilitates reading from and writing to network connections.

New cards
3

Nmap and NSE

a network scanner equipped with a scripting engine for network discovery and security auditing.

New cards
4

Impacket

a Python library designed for crafting and manipulating network packets at the protocol level.

New cards
5

CrackMapExec (CME)

a post-exploitation tool developed in Python and designed for penetration testing against networks. It can collect Active Directory information and conduct lateral movement through targeted networks.

New cards
6

Wireshark/tcpdump

network protocol analyzers used for capturing and inspecting packets to troubleshoot networks and security issues.

New cards
7

msfvenom

a tool within the Metasploit framework used for generating payloads for penetration testing.

New cards
8

Responder

inbuilt Kali tool for Link-Local Multicast name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) that responds to specific NetBIOS queries based on the file server request. By doing this, it can send out broadcast messages to a selected network.

New cards
9

hashcat

a tool for recovering passwords by brute-forcing hashes.

New cards
10

John the Ripper

a well-known password-cracking software used for dictionary attacks.

New cards
11

Hydra

a tool known for its capabilities in password cracking across multiple protocols and services.

New cards
12

BloodHound

a graphical tool for mapping out attack paths in Active Directory environments.

New cards
13

Medusa

a robust password cracking tool designed to test network authentication services.

New cards
14

Burp Suite

a suite of tools for web application testing that can proxy the flow of packets to allow for packet inspection and editing among other capabilities.

New cards
15

Mimikatz

a popular tool used for stealing passwords from windows devices.

New cards
16

Rubeus

a tool focused on the abuse and exploitation of Kerberos tickets in Active Directory environments.

New cards
17

Certify

a tool for managing and monitoring SSL certificates and related security aspects. It can be used to enumerate and abuse misconfigurations in Active Directory Certificate Services.

New cards
18

Seatbelt

a PowerShell script for offensive operations like credential harvesting and privilege escalation (system enumeration).

New cards
19

PowerShell/PowerShell Integrated Scripting Environment (ISE)

a command-line shell and scripting language for task automation and configuration management within a windows environment.

New cards
20

PsExec

a command-line tool that allows executing processes remotely on Windows systems without installing client software.

New cards
21

Evil-WinRM

a remote command execution tool designed specifically for Windows environments. Leverages the weaknesses WinRM to establish a foothold on a target system.

New cards
22

Living off the land binaries (LOLbins)

legitimate system binaries that can be repurposed for malicious activities.

New cards
23

TruffleHog

a tool used to search Git repositories for secrets and sensitive information that may have been committed inadvertently (such as secret keys).

New cards
24

Zed Attack Proxy (ZAP)

a penetration testing tool used to find vulnerabilities in web applications during development and testing.

New cards
25

Postman

a collaboration platform for API development that simplifies designing

New cards
26

sqlmap

an automated tool for detecting and exploiting SQL injection vulnerabilities in web applications.

New cards
27

Gobuster/DirBuster

tools used for brute-forcing directories and files on web servers.

New cards
28

Wfuzz

a tool designed for brute-forcing web applications. It can be used in various applications such as finding resources not in linked directories and fuzzing.

New cards
29

WPScan

a WordPress vulnerability scanner that checks for security vulnerabilities in WordPress installations.

New cards
30

Pacu

an open-source AWS exploitation framework, designed for offensive security testing against cloud environments

New cards
31

Docker Bench

a security assessment tool designed to evaluate Docker container environments against best security practices.

New cards
32

Kube-hunter

a Kubernetes security testing tool used to discover security issues and vulnerabilities in Kubernetes clusters.

New cards
33

Prowler

an open-source security tool designed to assess, audit, and enhance the security of AWS, GCP, and Azure.

New cards
34

ScoutSuite

a multi-cloud security auditing tool that assesses the security posture of cloud environments across various providers. Provides a snapshot of a cloud account at a given time.

New cards
35

WPAD

Web Proxy Auto-Discovery Protocol used for automatic proxy configuration in web browsers.

New cards
36

WiFi-Pumpkin

a framework for creating rogue Wi-Fi access points to perform man-in-the-middle attacks.

New cards
37

Aircrack-ng

a comprehensive suite of tools for assessing Wi-Fi network security.

New cards
38

WiGLE.net

a wireless network mapping service that collects and visualizes information about wireless networks worldwide.

New cards
39

InSSIDer

a Wi-Fi network scanner available for Windows and macOS to visualize and analyze Wi-Fi environments.

New cards
40

Kismet

a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs

New cards
41

Social Engineering Toolkit (SET)

a toolkit for simulating social engineering attacks to assess organizational vulnerabilities.

New cards
42

Gophish

an open-source phishing toolkit designed for performing simulated phishing attacks and security awareness training.

New cards
43

Evilginx

a man-in-the-middle attack framework designed to steal credentials and session cookies in phishing attacks.

New cards
44

theHarvester

an information-gathering tool used for discovering email addresses, sub-domains, hosts, employee names, and more

New cards
45

Maltego

an OSINT tool used for link analysis and visualization of relationships between entities from various sources by gathering and analyzing data on the internet.

New cards
46

Recon-ng

a web reconnaissance framework for information gathering and reconnaissance.

New cards
47

Browser Exploitation Framework (BeEF)

a penetration testing tool focused on targeting and exploiting web browsers.

New cards
48

Scapy

a powerful Python library used for packet manipulation and network analysis.

New cards
49

tcprelay

a suite of open-source utilities for editing and replaying previously captured network traffic.

New cards
50

MobSF

Mobile Security Framework for automated security analysis of mobile apps.

New cards
51

Frida

an open-source toolkit that allows developers and security professionals to inject code into running applications to monitor and change their behavior

New cards
52

Drozer

an Android security assessment framework for finding and exploiting security vulnerabilities in Android applications and devices.

New cards
53

Android Debug Bridge (ADB)

a command-line tool that allows communication with an Android device for debugging and development.

New cards
54

Bluecrack

a Bluetooth protocol stack security assessment tool.

New cards
55

Empire

an open-source post-exploitation framework and command and control (C2) tool that allows adversaries to expand their access in a victim's environment. It's designed for Windows environments.

New cards
56

PowerView

a PowerShell tool used for reconnaissance and data collection in Active Directory environments.

New cards
57

PowerUpSQL

a PowerShell toolkit designed for SQL Server attack and reconnaissance.

New cards
58

Bash

a Unix shell and command language interpreter.

New cards
59

Python

a high-level programming language known for its versatility and ease of use.

New cards
60

Breach and attack simulation (BAS)

provides an automated method to simulate, test, and validate the effectiveness of cybersecurity controls against potential threats.

New cards
61

Caldera

an automated adversary emulation system created by Mitre designed to simulate sophisticated cyber attacks.

New cards
62

Infection Monkey

an open-source security tool for testing network resilience and identifying potential attack vectors. Simulates cyber attacks on data centers and clouds.

New cards
63

Atomic Red Team

a library of adversary emulation plans and techniques used for testing and validating security defenses.

New cards
64

Netstat

a command-line tool used for displaying network connections and ports.

New cards
65

msbuild

the Microsoft Build Engine used for building .NET applications.

New cards
66

route

a command-line tool used for viewing and manipulating the IP routing table.

New cards
67

Covenant

a command and control framework for Red Team operations. uses just-in-time, in-memory, .NET compilation , and dynamic profiles to fool defensive detections.

New cards
68

sshuttle

a VPN-like tool that uses SSH to create a transparent proxy server between the local and remote networks.

New cards
69

Proxychains

a tool for routing TCP connections through proxy servers like TOR or any other.

New cards
70

PowerSploit

an open-source framework of PowerShell scripts and modules used by hackers to perform penetration testing and post-exploitation tasks

New cards

Explore top notes

note Note
studied byStudied by 27 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 2258 people
Updated ... ago
4.7 Stars(7)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 368 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 19 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 8919 people
Updated ... ago
4.7 Stars(54)

Explore top flashcards

flashcards Flashcard67 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard48 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard56 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard78 terms
studied byStudied by 78 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard43 terms
studied byStudied by 29 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard92 terms
studied byStudied by 35 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard123 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard29 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)