Skip to content

Latest commit

 

History

History
60 lines (48 loc) · 4.01 KB

Security_Tools.md

File metadata and controls

60 lines (48 loc) · 4.01 KB

Security Tools

These are my list of useful pentesting and CTF tools, broken down by category.

Forensics

  • Analyzing Disk Images (Autopsy, Sleuthkit)
    • Description: Autopsy is the GUI implementation of Sleuthkit, both of which are used for analyzing disk images and recovering files from them
    • Installation: sudo apt-get install autopsy sleuthkit

Threat Intelligence Database

Webpage Analysis

  • Framework stack (Wappalyzer)
    • Description: Is a website and browser extension that provides information about the framework stack, CMS, payment processors, etc. a website is using
    • Link: https://www.wappalyzer.com/
  • Directory Busting (ffuf, dirb and gobuster)
    • Description: For finding directories, paths, and content on a website. Note: These tools are often paired with wordlists like SecLists.
    • Installation: sudo apt install ffuf dirb gobuster
  • Subdomain Enumeration - Virtual Hosts (ffuf)
    • Description: Often times a subdomain won't have a DNS entry for it in a large public DNS server, and instead it's on a private DNS server or is resolved dynamically by the web server of the service by looking at the HOST header in the HTTP request. As a result, we can use ffuf to alter this header to see if we get a different result
    • Example: ffuf -w /usr/share/wordlists/SecLists/Discovery/DNS/namelist.txt -H "Host: FUZZ.acmeitsupport.thm" -u http://10.10.100.147 -fs {size}
      • The FUZZ parameter denotes the variable to be dynamically changed using the wordlist.
  • Certificate Transparency (CT) logs
    • Description: CA has publicly accessible logs for certificates they issue. These can provide information about subdomains that exists on a website.
    • Link: http://crt.sh/ and https://ui.ctsearch.entrust.com/ui/ctsearchui

Wordlists

  • SecLists
    • Often you want wordlists for password cracking, fuzzy payloads, directory busting, etc. SecLists provide a wide-encompassing directory of these lists
    • Link: https://github.com/danielmiessler/SecLists
    • Note: Locally I have these installed at /usr/share/wordlists/SecLists

OSINT