Tools To Learn Research - ConnorEast/Tech-Journal GitHub Wiki
Software based Tools:
IOmeter —> Open source software to test and evaluate data storage. It does this by simulating concurrent and realistic workloads. The main metrics tested are IOPS (Input/Output operations per second), Latency, and CPU utilization.
VMmark —> Used to assess the performance and scalability of VMware VM environments. This tool is used for VM performance tuning, capacity planning, optimization and consolidation, Vendor Product eval/comparison, and cloud computing performance validation.
iPerf —> An open source program which Measures network throughput and reliability. It does its job by establishing a connection between endpoints where it then transmits udp/tcp data packets to gauge the performance of the network link, The main usages of this tool are, network troubleshooting and optimization, as well as ensuring quality service.
Microsoft AD Test Tool —> Given AD’s usage, this tool is necessary for conducting tests on an AD server. It identifies issues, validates configuration and ensures proper adherence to best practices. It is used to assess the health and performance of the system while allowing for Admins to optimize and plan for potential disasters.
Linux Kernel/Daemon Commands Tools:
John the Ripper Kernel:
John the Ripper is a Kali Linux Penetration testing and hacking application that is typically used for decrypting passwords and or password cracking. It has three types of attacks. The first being a dictionary attack, the second being a brute force attack, and the final being Rainbow Tables.
Dictionary attacks takes a list of breached passwords and try's them against an account.
Brute Force Attacks are attacks that is done by going through all potential combinations of plain text that is set by parameters. Think randomization with rules.
Rainbow Tables use a list of password hashes and then attempts to decode accessible passwords themselves. This can only occur if the attacker has gained access to the password manager.
Source to learn with:
Kerberos attack using DCSync:
Sources to learn with: