4.1 Assess Organizational Security

Reconnaissance Tools

traceroute = determine the route a packet takes to the destination

nslookup / dig

netstat = network statistics that shows what IP addresses are communicating in/out of our device

curl

hping = TCP/IP packet analyzer/assembler

theHarvester = OSINT tool, scrapes info from various online resources

sn1per = combination of many tools, nmap, theharvester, dnsenum, metasploit - non-intrusive and very instrusive scanning option

scanless = running a scan from another host

dnsenum = enumerate DNS servers/information

nessus = vulnerability scanner

cuckoo = running the executable in a sandbox environment, identifies malware - track and trace API calls, network traffic, memory analysis


File Manipulation Tools

cat / head / tail / grep / chmod

file permissions

logger = write custom entries to syslog for further reference


Shell and Script Environments

SSH / Windows PowerShell


Packet Tools

Wireshark / tcpdump / tcpreplay


Forensics Tools

dd = create bit-by-bit copy of a drive

memdump = copy information from system memory and send it to a location in the system

WinHex = hexadecimal editor, disk cloning, drive replication, secure wipe/harddrive cleaning

FTK Imager = mount drives, image drives, make analysis on drives, read encrypted drives

Autopsy = perform digital forensics on computers, mobile phones

Exploitation framework = pre-built toolkit for exploits - build custom exploits - metasploit, SET (social engineering toolkit)

Data sanitization = removing all the data from a drive, no information remains in the drive

Last updated

Was this helpful?