1.4 Given a scenario, analyse the output from common vulnerability assessment tools
Web application scanner:
OWASP ZAP
Burp suite
Nikto
Arachni: evaluate web application security; scanning, scripted audits, vulnerability scans
Infrastructure vulnerability scanner:
Nessus
OpenVAS
Qualys
Software assessment tools and techniques:
Static analysis
Dynamic analysis
Reverse engineering
Fuzzing
Enumeration:
Nmap: returns port listing, MAC address, OS/kernel version, network distance, runtime
hping: sends TCP/UDP/ICMP/RAW-IP; firewall testing, TCP/IP auditing, network testing
Active vs passive
Responder: LLMNR/NBT-NS poisoner/rogue authentication server => steal NTLM hashes
Wireless assessment tools:
Aircrack-ng: suite of WiFi monitoring, attacking, testing & cracking (WEP/WPA) tools
Reaver: brute force against WPS PINs to recover WPA/WPA2 passphrases
oclHashcat: GPU-based hash cracker with dictionaries, masks, rules etc.
Cloud infrastructure assessment tools:
ScoutSuite: security posture assessment of cloud environments, highlights risks
Prowler: AWS security best practices assessment, auditing, hardening, forensics
Last updated