0% found this document useful (0 votes)
6 views3 pages

TOOLS

The document outlines various tools and goals used in the cybersecurity process, including reconnaissance, scanning, vulnerability assessment, exploitation, and reporting. Each section lists specific tools designed for tasks such as information gathering, identifying vulnerabilities, and documenting findings. The tools mentioned include popular options like Nmap, Metasploit, and Nessus, among others.

Uploaded by

Harsh Pathak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views3 pages

TOOLS

The document outlines various tools and goals used in the cybersecurity process, including reconnaissance, scanning, vulnerability assessment, exploitation, and reporting. Each section lists specific tools designed for tasks such as information gathering, identifying vulnerabilities, and documenting findings. The tools mentioned include popular options like Nmap, Metasploit, and Nessus, among others.

Uploaded by

Harsh Pathak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

TOOLS

Reconnaissance (Information Gathering)


🔹 Goal: Gather information about the target (domains, IPs, emails,
technologies).
🔹 Tools:
 Google Dorking – Advanced Google searches to find hidden data.
 Shodan – Search engine for internet-connected devices.
 theHarvester – Collects emails, subdomains, and names from public
sources.
 Maltego – Visual link analysis for OSINT (Open-Source Intelligence).
 WHOIS / nslookup / dig – Domain and IP lookup tools.
 Recon-ng – OSINT framework for automated reconnaissance.
 SpiderFoot – Automates passive recon using multiple data sources.
 Sublist3r – Finds subdomains of a given website.

Scanning & Enumeration


🔹 Goal: Identify open ports, services, and users on the target system.
🔹 Tools:
 Nmap – The best tool for network scanning & port scanning.
 Netcat – Useful for banner grabbing, port scanning, and backdoors.
 Nikto – Web vulnerability scanner.
 Gobuster / Dirb – Bruteforcing directories & files on web servers.
 Enum4Linux – Gathers SMB/NetBIOS information from Windows
machines.
 SNMPWalk – Enumerates SNMP data from network devices.
Vulnerability Assessment
🔹 Goal: Identify security weaknesses and misconfigurations.
🔹 Tools:
 Nessus – Comprehensive vulnerability scanner.
 OpenVAS – Open-source alternative to Nessus.
 Burp Suite – Web application vulnerability scanner (great for testing).
 OWASP ZAP – Automated web application security scanner.
 Metasploit Framework – Finds vulnerabilities & exploits them (also used
for exploitation).
 SQLmap – Detects and exploits SQL injection vulnerabilities.
 wpscan – Scans WordPress sites for security flaws.

Exploitation (Ethical Testing)


🔹 Goal: Exploit discovered vulnerabilities to test system security.
🔹 Tools:
 Metasploit Framework – The ultimate penetration testing framework.
 SQLmap – Automates SQL injection attacks.
 Hydra / Medusa – Bruteforcing login credentials.
 Mimikatz – Extracts credentials from Windows memory.
 John the Ripper / Hashcat – Cracks password hashes.
 BeEF (Browser Exploitation Framework) – Used for XSS attacks &
browser-based exploitation.
 Responder – Captures NTLM hashes from Windows networks.
 Bettercap – MITM (Man-in-the-Middle) attack tool.
Reporting & Mitigation

🔹 Goal: Document findings, provide recommendations, and fix vulnerabilities.


🔹 Tools:
 Dradis – Helps generate professional security reports.
 Faraday – Collaborative penetration testing reporting.
 Metasploit Pro – Generates automated vulnerability reports.
 KeepNote – Note-taking tool for pentesters.
 CherryTree – Structured note-taking tool for organizing findings.
 LaTeX / Markdown – Useful for creating well-formatted reports.

You might also like