6.12 Tool Label
Vocabulary Name: tool-label-ov
The tool label vocabulary is currently used in the following SDO(s):
- Tool
Tool labels describe the categories of tools that can be used to perform attacks.
| Vocabulary Summary | |
|---|---|
| denial-of-service, exploitation, information-gathering, network-capture, credential-exploitation, remote-access, vulnerability-scanning | |
| Vocabulary Value | Description |
| denial-of-service | Tools used to perform denial of service attacks or DDoS attacks, such as Low Orbit Ion Cannon (LOIC) and DHCPig. |
| exploitation | Tools used to exploit software and systems, such as sqlmap and Metasploit. |
| information-gathering | Tools used to enumerate system and network information, e.g., NMAP. |
| network-capture | Tools used to capture network traffic, such as Wireshark and Kismet. |
| credential-exploitation | Tools used to crack password databases or otherwise exploit/discover credentials, either locally or remotely, such as John the Ripper and NCrack. |
| remote-access | Tools used to access machines remotely, such as VNC and Remote Desktop. |
| vulnerability-scanning | Tools used to scan systems and networks for vulnerabilities, e.g., Nessus. |