Tools and Utilities

Here are some tools and utilities commonly used for practices related to networks:

OpenVPN

  • VPN system that implements both client and server applications, including a command-line utility

Commands

  • Installation

sudo apt install openvpn

  • Connect to a VPN

sudo openvpn $ovpnfile

SmbClient

  • Tool for accessing a server using the SMB protocol

Commands

  • Installation

sudo apt install smbclient

  • Connect and interact with an SMB server

Responder

  • Help in the passive obtention of credentials by mounting an SMB server on the web that intercepts internal communication from this protocol

Commands

  • Install


  • Change the configuration file


  • Initialize tool


  • Abuse an RFI on a web page to intercept SMB credentials

If the process works, we will see the server catch the credentials

Tcpdump

  • Command-line packet analyzer tool used to capture and inspect network traffic sent via the TPC protocol in real-time

Commands

  • Install


  • Set up a listener

Netcat

  • Unix utility that reads and writes data across network connections

  • Can act as a server or as a listener

  • By default makes a TCP connection but can be used with TCP or UDP protocol

Commands

  • Install


  • Start netcat


  • Start in listen mode


  • Make a file transmission


  • Execute a program on the server


  • Interact with network protocols

Nmap

  • An open-source tool for network exploration and security auditing that works as a network mapper

Scan types

  • SYN scans are also known as Half-open or Stealth. They are stealthier than Connect scans

  • The difference between Connect and SYN scans is that Connect performs a full three-way handshake with the target. Instead of that, SYN scans send back an RST packet after receiving a SYN/ACK

  • The UDP scans are slower than TCP scans

  • In UDP scans, if the port is open, it will send no response and will be marked as open|filtered. If there's a response will be marked as open. If it's closed, the target responds with an ICMP packet containing a message that the port is unreachable

  • NULL, FIN, Xmas, and ACK scans are stealthier than SYN or UDP scans, usually used for firewall evasion

  • NULL scans send a TCP request with no flags, the target host responds with RST if the port is closed

  • FIN scans send a TCP request with the FIN flag, used to gracefully close an active connection. The target host responds with RST if the port is closed

  • Xmas scans send a malformed TCP packet, and the target host responds with RST if the port is closed

  • Microsoft Windows may respond to a NULL, FIN, or Xmas scan with an RST for every port

NSE

  • The Nmap Scripting Engine is a library of scripts written in Lua that can be used for scanning vulnerabilities and automating exploits for them.

  • Every script has a category related to its use scenario

  • By default, Nmap stores scripts in /usr/share/nmap/scripts/script.db

Port State

  • Open: This indicates that the connection to the scanned port has been established

  • Closed: TCP protocol indicates that the packet we received back contains an RST flag. Can be used to determine if a target is alive or not

  • Filtered: Cannot correctly identify whether the scanned port is open or closed because it got no response or an error code from the target

  • Unfiltered: Only occurs during the TCP-ACK scan and means that the port is accessible, but it cannot be determined if it's open or closed

  • Open|filtered: Didn't get a response, so a firewall or packet filter could be protecting the port

  • Closed|filtered: Only occurs in the IP ID idle scans, indicating it was impossible to determine if a port is closed or filtered by a firewall

Commands

  • Install


  • Basic scans


  • TCP scan


  • UDP scan


  • Select which port scan


  • Scan without checking if the target is alive


  • Only make host discovery

If ICMP scans return MAC addresses, it means the hosts are in the same subnet


  • DNS resolution


  • Detect OS


  • Get the versions of the services running


  • List hosts to be scanned without scanning them


  • Increase the verbosity level of the output


  • Specified Output Format


  • Increase the speed the scan runs


  • Use scripts from the NSE library


  • Fragment packets sent in a scan


  • Specify the delay between packets sent


  • Generate an invalid checksum for packets


  • Append an arbitrary length of random data to the end of packets


  • Specify the number of retries if a packet gets dropped or blocked


  • For firewall evasion

ARP-Scan

  • A tool for making host discovery via the ARP protocol

  • Only devices in the same subnet can be discovered

Commands

  • Install


  • Scan options

Masscan

  • A tool for making port scanning, which is optimized for speed, making it particularly useful for large-scale scans

Commands

  • Install


  • Scan options

Docker

  • An open-source platform that allows building, packaging, and running applications in isolated environments called containers

Commands

  • Install


  • Manage containers and images

onesixtyone

  • An SNMP scanner which is used to brute force the community string names

Commands

  • Install

  • Usage

xfreerdp

  • An open-source implementation of the RDP protocol

Commands

  • Install

  • Usage

Rsync

  • Command-line tool for fast, flexible, and efficient file and directory synchronization and transfer between two locations

Commands

  • Install

  • Usage

Impacket

  • A collection of Python classes for working with network protocols

Commands

  • Installation


  • Use of scripts

Scapy

  • Powerful interactive packet manipulation library written in Python, used to forge or decode packets of a wide number of protocols, send, capture them, match requests and replies, and much more

Commands

  • Install


  • Usage

Tshark

  • A packet capture tool used to capture ICMP packets. Comes by default in the Wireshark tool packet

Commands

  • Install


  • Usage

Aircrack-ng

  • Wireless security toolset used for monitoring, attacking, testing, and cracking Wi-Fi networks

Commands

  • Install


  • Usage

rpcclient

  • Central tool to realize operational and work-sharing structures in networks and client-server architectures, useful for the enumeration of the SMB protocol

Commands

  • Install


  • Usage


smbmap

  • Security tool used for enumerating and interacting with SMB shares on a network

Commands

  • Install


  • Usage

CrackMapExec

  • Powerful post-exploitation tool used for network reconnaissance, credential validation, and lateral movement in Windows Active Directory (AD) environments

Commands

  • Install


  • Usage

smtp-user-enum

  • A tool for making user enumeration for the SMTP protocol

Commands

  • Install


  • Usage

snmpwalk

  • A tool for getting information about the community string for an SNMP protocol

Commands

  • Install


  • Usage

snmp-check

  • Utility for scanning resources via the SNMP protocol

Commands

  • Install


  • Usage

odat

  • Oracle Database Attacking Tool, an open-source penetration testing tool that tests the security of Oracle databases remotely

Commands

  • Install the tool and required components using the following script

The first time running odat there will be some errors, but it's normal and won't appear later


  • Usage

vnstat

  • Lightweight command-line network traffic monitoring that tracks bandwidth usage per network interface using data from the kernel

Commands

  • Install


  • Usage

hping

  • A powerful command-line network tool used primarily for packet crafting and analysis, which allows sending custom TCP/IP packets and observing the responses

Commands

  • Install


  • Usage

Last updated