Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
NMAP/ ZENMAP |
Network scanning tools that provide information about open ports of a system to determine vulnerabilities NMAP is command line and zenmap is a GUI version |
|
BRUTER |
A GUI based brute force tool used by hackers , to obtain passwords of users; using a list of commonly used passwords by using a dictionary attack |
|
What are the cycles of Incident response Life Cycle |
Preparation Detection and analysis Containment, eradicate and recovery Post incident activity |
|
Netstat |
A command line tool in windows and linux that provides connection information |
|
Tasklist |
Windows command that’s shows running task |
|
Md5sum |
A hashing tool. Used in Linux |
|
Kali linux |
Is a Linux distribution created for digital forensics and penetration |
|
Metasploit |
A penetration testing framework that comes loaded on kali Linux; that provides tools for penetration testers to improve security assessments & awareness |
|
Meterpreter |
A Metaspolit payload that provides an interactive shell from which an attacker can explore the target machine and execute code.
Resides in memory |
|
Binwalk |
An analysis tool used to analyze and find executable code and embedded files inside binary files. and extract firmware images |