Linux Tools & Concepts Flashcards

These are almost always tested in Linux context. (10 cards)

1
Q

What are the main components of Bash scripting?

A

loops, conditionals, operators

These components are essential for controlling the flow of a script.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three tools used for wireless attacks.

A

-Aircrack-ng – Wi-Fi password cracker (WPA/WPA2 handshake brute-force).
-Kismet – Wireless network sniffer and hidden SSID detector.
-WiFi-Pumpkin – Rogue AP for MITM attacks and credential capture.

These tools are commonly used for testing the security of wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of msfvenom in Metasploit?

A

Msfvenom – Payload generator for custom shellcode/exploits.

Look for suspicious file names or payloads with reverse shells (often with unusual ports).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which tools are often run on Linux-based attacker VMs?

A

Impacket, CrackMapExec (CME)
-Impacket – Python toolkit for network protocols & lateral movement (psexec.py, secretsdump.py).
-CrackMapExec (CME) – Swiss army knife for AD — spray creds, enumerate, move laterally.

Detect by unusual NTLM authentication spikes, password spray patterns, or smbexec/psexec events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List four tools used for web application testing.

A

sqlmap, Gobuster/DirBuster, wfuzz, WPScan

Each of these tools serves a specific purpose in identifying vulnerabilities in web applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some tools used for packet analysis and tunneling?

A

tcpdump, Scapy, Proxychains, sshuttle

These tools help in capturing and analyzing network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some methods of Linux privilege escalation?

A

cron jobs, SUID bits, library injection, shell escape

These methods exploit vulnerabilities to gain elevated privileges on Linux systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the default port for SSH?

A

22

SSH is commonly used for secure remote login.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does RPC stand for in terms of default services?

A

Remote Procedure Call

RPC allows programs to execute procedures on other address spaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: NFS stands for _______.

A

Network File System

NFS is a protocol for file sharing over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly