4.1 Assess Organizational Security
Reconnaissance Tools
traceroute = determine the route a packet takes to the destination
nslookup / dig
netstat = network statistics that shows what IP addresses are communicating in/out of our device
curl
hping = TCP/IP packet analyzer/assembler
theHarvester = OSINT tool, scrapes info from various online resources
sn1per = combination of many tools, nmap, theharvester, dnsenum, metasploit - non-intrusive and very instrusive scanning option
scanless = running a scan from another host
dnsenum = enumerate DNS servers/information
nessus = vulnerability scanner
cuckoo = running the executable in a sandbox environment, identifies malware - track and trace API calls, network traffic, memory analysis
File Manipulation Tools
cat / head / tail / grep / chmod

logger = write custom entries to syslog for further reference
Shell and Script Environments
SSH / Windows PowerShell
Packet Tools
Wireshark / tcpdump / tcpreplay
Forensics Tools
dd = create bit-by-bit copy of a drive
memdump = copy information from system memory and send it to a location in the system
WinHex = hexadecimal editor, disk cloning, drive replication, secure wipe/harddrive cleaning
FTK Imager = mount drives, image drives, make analysis on drives, read encrypted drives
Autopsy = perform digital forensics on computers, mobile phones
Exploitation framework = pre-built toolkit for exploits - build custom exploits - metasploit, SET (social engineering toolkit)
Data sanitization = removing all the data from a drive, no information remains in the drive
Last updated
Was this helpful?