Tools and Utilities
Here are some tools and utilities commonly used for practices related to networks:
OpenVPN
VPN system that implements both client and server applications, including a command-line utility
Commands
Installation
sudo apt install openvpnConnect to a VPN
sudo openvpn $ovpnfileSmbClient
Tool for accessing a server using the SMB protocol
Commands
Installation
sudo apt install smbclientConnect and interact with an SMB server
Responder
Help in the passive obtention of credentials by mounting an SMB server on the web that intercepts internal communication from this protocol
Commands
Install
Change the configuration file
Initialize tool
If we get an error in any port, we have to update the Responder.conf file and set to off the value of the service related to that port
Abuse an RFI on a web page to intercept SMB credentials
Tcpdump
Command-line packet analyzer tool used to capture and inspect network traffic sent via the TPC protocol in real-time
Commands
Install
Set up a listener
Netcat
Unix utility that reads and writes data across network connections
Can act as a server or as a listener
By default makes a TCP connection but can be used with TCP or UDP protocol
Commands
Install
Start netcat
Start in listen mode
Make a file transmission
Execute a program on the server
Interact with network protocols
To make a line jump is necessary to press Shift+Enter
Nmap
An open-source tool for network exploration and security auditing that works as a network mapper
Scan types
SYN scans are also known as Half-open or Stealth. They are stealthier than Connect scans
The difference between Connect and SYN scans is that Connect performs a full three-way handshake with the target. Instead of that, SYN scans send back an RST packet after receiving a SYN/ACK
The UDP scans are slower than TCP scans
In UDP scans, if the port is open, it will send no response and will be marked as open|filtered. If there's a response will be marked as open. If it's closed, the target responds with an ICMP packet containing a message that the port is unreachable
NULL, FIN, Xmas, and ACK scans are stealthier than SYN or UDP scans, usually used for firewall evasion
NULL scans send a TCP request with no flags, the target host responds with RST if the port is closed
FIN scans send a TCP request with the FIN flag, used to gracefully close an active connection. The target host responds with RST if the port is closed
Xmas scans send a malformed TCP packet, and the target host responds with RST if the port is closed
Microsoft Windows may respond to a NULL, FIN, or Xmas scan with an RST for every port
NSE
The Nmap Scripting Engine is a library of scripts written in Lua that can be used for scanning vulnerabilities and automating exploits for them.
Every script has a category related to its use scenario
By default, Nmap stores scripts in /usr/share/nmap/scripts/script.db
Port State
Open: This indicates that the connection to the scanned port has been established
Closed: TCP protocol indicates that the packet we received back contains an RST flag. Can be used to determine if a target is alive or not
Filtered: Cannot correctly identify whether the scanned port is open or closed because it got no response or an error code from the target
Unfiltered: Only occurs during the TCP-ACK scan and means that the port is accessible, but it cannot be determined if it's open or closed
Open|filtered: Didn't get a response, so a firewall or packet filter could be protecting the port
Closed|filtered: Only occurs in the IP ID idle scans, indicating it was impossible to determine if a port is closed or filtered by a firewall
Commands
Install
Basic scans
TCP scan
UDP scan
Select which port scan
Scan without checking if the target is alive
Only make host discovery
DNS resolution
Detect OS
Get the versions of the services running
List hosts to be scanned without scanning them
Increase the verbosity level of the output
Specified Output Format
Increase the speed the scan runs
This mode is louder than normal
Use scripts from the NSE library
Fragment packets sent in a scan
The length of packets must be a multiple of 8
Specify the delay between packets sent
Generate an invalid checksum for packets
Append an arbitrary length of random data to the end of packets
Specify the number of retries if a packet gets dropped or blocked
For firewall evasion
ARP-Scan
A tool for making host discovery via the ARP protocol
Only devices in the same subnet can be discovered
Commands
Install
Scan options
Masscan
A tool for making port scanning, which is optimized for speed, making it particularly useful for large-scale scans
Commands
Install
Scan options
Docker
An open-source platform that allows building, packaging, and running applications in isolated environments called containers
Commands
Install
Manage containers and images
onesixtyone
An SNMP scanner which is used to brute force the community string names
Commands
Install
Usage
xfreerdp
An open-source implementation of the RDP protocol
Commands
Install
Usage
Rsync
Command-line tool for fast, flexible, and efficient file and directory synchronization and transfer between two locations
Commands
Install
Usage
Impacket
A collection of Python classes for working with network protocols
Commands
Installation
Use of scripts
Scapy
Powerful interactive packet manipulation library written in Python, used to forge or decode packets of a wide number of protocols, send, capture them, match requests and replies, and much more
Commands
Install
Usage
Tshark
A packet capture tool used to capture ICMP packets. Comes by default in the Wireshark tool packet
Commands
Install
Usage
Aircrack-ng
Wireless security toolset used for monitoring, attacking, testing, and cracking Wi-Fi networks
Commands
Install
Usage
rpcclient
Central tool to realize operational and work-sharing structures in networks and client-server architectures, useful for the enumeration of the SMB protocol
Commands
Install
Usage
smbmap
Security tool used for enumerating and interacting with SMB shares on a network
Commands
Install
Usage
CrackMapExec
Powerful post-exploitation tool used for network reconnaissance, credential validation, and lateral movement in Windows Active Directory (AD) environments
Commands
Install
Usage
smtp-user-enum
A tool for making user enumeration for the SMTP protocol
Commands
Install
Usage
snmpwalk
A tool for getting information about the community string for an SNMP protocol
Commands
Install
Usage
snmp-check
Utility for scanning resources via the SNMP protocol
Commands
Install
Usage
odat
Oracle Database Attacking Tool, an open-source penetration testing tool that tests the security of Oracle databases remotely
Commands
Install the tool and required components using the following script
Usage
vnstat
Lightweight command-line network traffic monitoring that tracks bandwidth usage per network interface using data from the kernel
Commands
Install
Usage
hping
A powerful command-line network tool used primarily for packet crafting and analysis, which allows sending custom TCP/IP packets and observing the responses
Commands
Install
Usage
Last updated