6.12 Tool Label
Vocabulary Name: tool-label-ov
The tool label vocabulary is currently used in the following SDO(s):
- Tool
Tool labels describe the categories of tools that can be used to perform attacks.
Vocabulary Summary | |
---|---|
denial-of-service, exploitation, information-gathering, network-capture, credential-exploitation, remote-access, vulnerability-scanning | |
Vocabulary Value | Description |
denial-of-service | Tools used to perform denial of service attacks or DDoS attacks, such as Low Orbit Ion Cannon (LOIC) and DHCPig. |
exploitation | Tools used to exploit software and systems, such as sqlmap and Metasploit. |
information-gathering | Tools used to enumerate system and network information, e.g., NMAP. |
network-capture | Tools used to capture network traffic, such as Wireshark and Kismet. |
credential-exploitation | Tools used to crack password databases or otherwise exploit/discover credentials, either locally or remotely, such as John the Ripper and NCrack. |
remote-access | Tools used to access machines remotely, such as VNC and Remote Desktop. |
vulnerability-scanning | Tools used to scan systems and networks for vulnerabilities, e.g., Nessus. |