| Networking
                        
                                                                                    
                                                                                            | Windows | Linux |  
                                                                                            | tracert | traceroute | displays possible routes and measuring transit delays of packets |  
                                                                                            | nslookup | nslookup/dig | determines the IP address associated with a domain name, obtain the mail server settings for a domain |  
                                                                                            | ipconfig | ifconfig | displays all the network configurations of the currently connected network devices and can modify the DHCP & DNS settings |  
                                                                                            | nmap | nmap | open-source network scanner that is used to discover hosts and services on a computer network by sending packets and analyzing their responses |  
                                                                                            | pathping |  | used to determine if a host is reachable |  
                                                                                            | hping | hping | open-source packet generator and analyzer for the TCP/IP protocol that is used for security auditing and testing of firewalls and networks |  
                                                                                            | netstat | netstat | displays network connections for TCP, routing tables, and a number of network interface and network protocol stats |  
                                                                                            |  | netcat | for reading from and writing to network connections using TCP or UDP which is dependable back-end that can be used directly or easily driven by other programs and scripts |  
                                                                                            | arp | arp | utility for viewing and modifying the local Address Resolution Protocol (ARP) cache on a given host or server |  
                                                                                            | route | route | used to view and manipulate the IP routing tables on a host or server |  
                                                                                            | curl | curl | tool to transfer data to or from a server, using any of the supported protocol (HTTP, FTP, IMAP, POP3, SCP, SFTP, SMTP, TFTP, TELNET, LDAP, or FILE) |  
                                                                                            | the harvester | the harvester | python script that is used to gather emails, subdomains, hosts, employee, names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN database |  
                                                                                            | sn1per | sn1per | an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities across a network |  
                                                                                            | scanless | scanless | used to create an exploitation website that can perform open port scans in a more stealth-like manner |  
                                                                                            | dnsenum | dnsenum | used for DNS enumeration to locate all DNS servers and DNS entries for a given organization |  
                                                                                            | Nessus | Nessus | proprietary vulnerability scanner that can remotely scan a computer or network for vulnerabilities |  
                                                                                            | Cuckoo | Cuckoo | open source software for automating analysis of suspicious files |  |  | File Manipulation
                        
                                                                                    
                                                                                            | Linux |  
                                                                                            | head | command-line utility for outputting the first ten lines of a file provided |  
                                                                                            | tail | command-line utility for outputting the last ten lines of a file provided to it |  
                                                                                            | cat | command-line utility for outputting the content of a file to the screen |  
                                                                                            | grep | command-line utility for searching plain-text data sets for lines that match a regular expression or patter |  
                                                                                            | chmod | command-line utility used to change the access permissions of file system objects |  
                                                                                            | logger | utility that provides an easy way to add messages to the /var/log/syslog files from the command line or from other files |  Packet Capture
                        
                                                                                    
                                                                                            | Windows | Linux |  
                                                                                            | windump | tcpdump | a suite of free open source utilities for editing and replaying previously captured network traffic |  
                                                                                            | Wireshark | Wireshark | a popular network analysis tool to capture network packets and display them at a granular level for real-time or offline analysis |  Exploitation
                        
                                                                                    
                                                                                            | Metasploit (msfconsole) | Metasploit (msfconsole) | a computer security tool that offers information about software vulnerabilities, IDS signature development, and improves penetration test |  
                                                                                            | Browser Exploitation Framework (BeEF) | Browser Exploitation Framework (BeEF) | a tool that can hook one or more browsers and can use them as a beachhead of launching various direct commands and further attack against the system from within the browser |  
                                                                                            | Cain and Abel (cain) | Cain and Abel (cain) | a password recovery tool that can be used through sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attack, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, and analyzing routing protocols |  
                                                                                            | John the Ripper (john) | John the Ripper (john | an open source password security auditing and password recovery tool available for many operating systems |  |  | Shells and Scripts
                        
                                                                                    
                                                                                            | Windows | Linux |  
                                                                                            | SSH | SSH | utility that supports encrypted data transfer between two computers for secure logins, file transfers, or general purpose connectons |  
                                                                                            | PowerShell |  | a task automation and configuration management framework from Microsoft, consisting of a command-line shell and the associated scripting language |  
                                                                                            | Python | Python | An interpreted, high-level and general-purpose programming language |  
                                                                                            | OpenSSL | OpenSSL | a software library for application that secure communications over computer networks against eavesdropping or need to identify the party at the other end |  Forensics
                        
                                                                                    
                                                                                            | Windows | Linux |  
                                                                                            |  | dd | a command line utility to copy disk images using a bit by bit copying process |  
                                                                                            | FTK Imager | FTK Imager | a data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis with a forensic tool is needed |  
                                                                                            |  | memdump | a command line utility to dump system memory to the standard output stream by skipping over holes in memory maps |  
                                                                                            | WinHex | WinHex | a commercial disk editor and universal hexadecimal editor used for recovery and digital forensics |  
                                                                                            | Autopsy | Autopsy | a digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics |  | 
            
Created By
Metadata
Comments
No comments yet. Add yours below!
Add a Comment