The document outlines various tools and goals used in the cybersecurity process, including reconnaissance, scanning, vulnerability assessment, exploitation, and reporting. Each section lists specific tools designed for tasks such as information gathering, identifying vulnerabilities, and documenting findings. The tools mentioned include popular options like Nmap, Metasploit, and Nessus, among others.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
6 views3 pages
TOOLS
The document outlines various tools and goals used in the cybersecurity process, including reconnaissance, scanning, vulnerability assessment, exploitation, and reporting. Each section lists specific tools designed for tasks such as information gathering, identifying vulnerabilities, and documenting findings. The tools mentioned include popular options like Nmap, Metasploit, and Nessus, among others.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3
TOOLS
Reconnaissance (Information Gathering)
🔹 Goal: Gather information about the target (domains, IPs, emails, technologies). 🔹 Tools: Google Dorking – Advanced Google searches to find hidden data. Shodan – Search engine for internet-connected devices. theHarvester – Collects emails, subdomains, and names from public sources. Maltego – Visual link analysis for OSINT (Open-Source Intelligence). WHOIS / nslookup / dig – Domain and IP lookup tools. Recon-ng – OSINT framework for automated reconnaissance. SpiderFoot – Automates passive recon using multiple data sources. Sublist3r – Finds subdomains of a given website.
Scanning & Enumeration
🔹 Goal: Identify open ports, services, and users on the target system. 🔹 Tools: Nmap – The best tool for network scanning & port scanning. Netcat – Useful for banner grabbing, port scanning, and backdoors. Nikto – Web vulnerability scanner. Gobuster / Dirb – Bruteforcing directories & files on web servers. Enum4Linux – Gathers SMB/NetBIOS information from Windows machines. SNMPWalk – Enumerates SNMP data from network devices. Vulnerability Assessment 🔹 Goal: Identify security weaknesses and misconfigurations. 🔹 Tools: Nessus – Comprehensive vulnerability scanner. OpenVAS – Open-source alternative to Nessus. Burp Suite – Web application vulnerability scanner (great for testing). OWASP ZAP – Automated web application security scanner. Metasploit Framework – Finds vulnerabilities & exploits them (also used for exploitation). SQLmap – Detects and exploits SQL injection vulnerabilities. wpscan – Scans WordPress sites for security flaws.
Exploitation (Ethical Testing)
🔹 Goal: Exploit discovered vulnerabilities to test system security. 🔹 Tools: Metasploit Framework – The ultimate penetration testing framework. SQLmap – Automates SQL injection attacks. Hydra / Medusa – Bruteforcing login credentials. Mimikatz – Extracts credentials from Windows memory. John the Ripper / Hashcat – Cracks password hashes. BeEF (Browser Exploitation Framework) – Used for XSS attacks & browser-based exploitation. Responder – Captures NTLM hashes from Windows networks. Bettercap – MITM (Man-in-the-Middle) attack tool. Reporting & Mitigation
🔹 Goal: Document findings, provide recommendations, and fix vulnerabilities.