2.3 Network Security Testing Tools

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

13 Terms

1
New cards

nmap / zenmap

low-level scanner used to discover computers and their services on a network. can be used for malicious purposes as it allows the use of decoy hosts on the same LAN as the target host to mask the source of the scan

2
New cards

superscan

port scanning software that is designed to detect open TCP and UDP ports, determine what services are running on those ports, and to run queries, such as whois, ping, traceroute, and hostname lookups

3
New cards

security information event management (SIEM)

technology used in enterprise organizations to provide real time reporting and long-term analysis of security events

4
New cards

gfi languard

a network and security scanner which detects vulnerabilities

5
New cards

tripwire

assesses and validates IT configurations against internal policies, compliance standards, and security best practices

6
New cards

nessus

a vulnerability scanning software, focusing on remote access, misconfigurations, and DoS against the TCP/IP stack

7
New cards

l0phtcrack

a password auditing and recovery application

8
New cards

metasploit

provides information about vulnerabilities and aids in penetration testing and IDS signature development

9
New cards

classic TCP and UDP port scanning

searches for different services on one host

10
New cards

classic TCP and UDP port sweeping

searches for the same service on multiple hosts

11
New cards

stealth TCP and UDP port scans and sweeps

similar to classic scans and sweeps, but harder to detect by the target host or IPS

12
New cards

remote operating system identification

AKA OS fingerprinting, identifies the operating system of the host

13
New cards

security information management (SIM) and security event management (SEM)

what 2 previous products were combined to create security information event management (SIEM)?