[CERTMaster]
- log aggregation
- credentialed scan
- non credentialed scan
- appropriate data inputs:
- Windows 10 hosts
- DLP systems
- Vulnerability scanners
- configuration review
- False positive (Caused by passive & port scanning)
- Intelligence fusion
- Nikto (a web application scanner that scans for SQL injection exploits)
[CLC: software tools for security assessment ]
- protocol analyzerz
- network scanners
- wireless scanners/cracker
- password crackers
- vulnerability scanners
- configuration compliance scanners
- exploitation frameworks
- data sanitization tools
- steganography tools
- honeypots
- backup utilities
- banner grabbing
- passive vs. active
- other command line tools:
- ping
- netstat
- tracert
- nslookup/dig =dns tools
- arp =IP addresses
- ipconfig/ ip/ifconfig
- tcpdumb
- nmap
- netcat