Domain 4-Tools Flashcards

(60 cards)

1
Q

Aircrack-ng

A

Suite for cracking Wi-Fi passwords and analyzing 802.11 wireless traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Android Debug Bridge (ADB)

A

Command-line tool to interact with and debug Android devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Atomic Red Team

A

Library of adversary simulation tests mapped to MITRE ATT&CK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BeEF (Browser Exploitation Framework)

A

Tool for client-side attacks via web browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BloodHound

A

Graph-based tool for analyzing Active Directory trust relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bluestrike

A

Framework for assessing Bluetooth vulnerabilities and attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Burp Suite

A

Web vulnerability scanner and proxy for testing web apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Caldera

A

Automated adversary emulation platform from MITRE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Certify

A

Tool for attacking and abusing Active Directory Certificate Services (AD CS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud-native vendor tools

A

Security assessment utilities built into cloud providers (e.g., AWS CLI, Azure Security Center).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CrackMapExec (CME)

A

Swiss army knife for pentesting Active Directory and SMB environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DirBuster / Gobuster

A

Tools for brute-forcing directories/files on web servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Docker Bench

A

Security scanner for Docker container configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Drozer

A

Android security testing framework for assessing mobile applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Evil-WinRM

A

Remote management tool for exploiting and administering Windows systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Evilginx

A

Reverse proxy tool for phishing and man-in-the-middle attacks against authentication flows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Gophish

A

Phishing framework for creating and running phishing campaigns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

hashcat

A

Advanced GPU-based password cracking tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hydra

A

Fast brute-force login cracker for multiple protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Impacket

A

Python library for crafting and executing network protocols (often used for AD attacks).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Infection Monkey

A

Breach and attack simulation (BAS) tool to test lateral movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

InSSIDer

A

Wi-Fi scanner for analyzing wireless signals and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

John the Ripper

A

Popular open-source password cracking tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Kismet

A

Wireless network detector and packet sniffer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Kube-hunter
Tool for hunting Kubernetes cluster vulnerabilities.
26
Living off the Land Binaries (LOLbins)
Native system binaries abused by attackers to avoid detection (e.g., PowerShell, certutil).
27
Maltego
OSINT and data-link analysis tool for reconnaissance.
28
Medusa
Parallel, fast password brute-forcing tool.
29
Metasploit
Exploitation framework for developing, testing, and executing exploits.
30
Mimikatz
Credential dumping and Windows authentication attack tool.
31
MobSF (Mobile Security Framework)
Automated testing framework for mobile application security.
32
msfvenom
Payload generator bundled with Metasploit.
33
Netcat
Network utility for reading/writing to network connections (“Swiss army knife of networking”).
34
Nmap (NSE)
Network scanner with scripting engine for service enumeration and vulnerability detection.
35
Pacu
AWS exploitation framework for cloud penetration testing.
36
Postman
API testing and exploitation tool.
37
PowerShell / PowerShell ISE
Scripting environment often used for automation and attacks in Windows.
38
PowerSploit
PowerShell scripts for offensive security (privilege escalation, AV evasion).
39
PowerUpSQL
Tool for attacking SQL Server environments with PowerShell.
40
PowerView
PowerShell toolkit for Active Directory reconnaissance.
41
Prowler
AWS security assessment tool for compliance and misconfiguration detection.
42
PsExec
Windows Sysinternals tool for executing processes on remote systems.
43
Recon-ng
Web reconnaissance framework similar to Metasploit for OSINT.
44
Responder
Tool for LLMNR/NBNS poisoning to capture hashes on networks.
45
Rubeus
Tool for Kerberos ticket attacks in Windows domains.
46
Scapy
Python library for packet crafting, sniffing, and network attack scripting.
47
ScoutSuite
Multi-cloud security auditing tool.
48
Seatbelt
Windows enumeration tool for privilege escalation and situational awareness.
49
SET (Social Engineering Toolkit)
Toolkit for social engineering attacks (phishing, credential harvesting, etc.).
50
sqlmap
Automated SQL injection and database takeover tool.
51
tcprelay
Tool for relaying TCP connections (used in iOS testing).
52
theHarvester
OSINT tool for gathering emails, domains, and subdomains.
53
TruffleHog
Tool for detecting secrets (API keys, credentials) in code repositories.
54
WiFi-Pumpkin
Framework for rogue Wi-Fi AP and man-in-the-middle attacks.
55
WiGLE.net
Wireless network mapping platform/database.
56
Wireshark / tcpdump
Packet analyzers for deep inspection of network traffic.
57
WPAD
Protocol and attack vector for proxy auto-discovery hijacking.
58
WPScan
WordPress vulnerability scanner.
59
Wfuzz
Web application brute-forcer and fuzzing tool.
60
Zed Attack Proxy (ZAP)
Open-source web app security scanner (OWASP).