Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
Pentest+
> 2 (?) NMAP > Flashcards
2 (?) NMAP Flashcards
(0 cards)
Study These Flashcards
Pentest+
flashcards
Decks in class (29)
# Cards
1 Planning & scoping
23
2.1 Information gathering & Vulnerability scanning: passive reconnaissance
76
2.2.1 Information gathering & Vulnerability scanning: active reconnaissance/ scanning & recon
27
2.2.2 Information gathering & Vulnerability scanning: active reconnaissance/ Detecting and Evading Defenses & Packet Crafting
27
2.2.3 Information gathering & Vulnerability scanning: active reconnaissance/ Eavesdropping & wardriving
19
2.3 Information gathering & Vulnerability scanning: Vulnerability scanning
21
2.4 Information gathering & Vulnerability scanning: Nmap
38
2 (?) NMAP
0
3.1 Attacks & exploits: Social Engineering and Physical Attacks
35
3.2 Attacks & exploits: Wireless Attacks
42
3.3 Attacks & exploits: Network Attacks
53
3.4 Attacks & exploits: Application vulnerabilities
51
3.5 Attacks & exploits: Application attacks
29
3.6 Attacks & exploits: Cloud attacks
29
3.7 Attacks & exploits: Attacks on Mobile Devices
49
3.8 Attacks & exploits: Attacks on Specialized Systems
42
3.9 Attacks & exploits: Post-Exploitation Exploits
50
3.10 Attacks & exploits: Detection Avoidance
39
4.1 Reporting & communications: Communication & reports
23
4.2 Reporting & communications: Findings & remediation
29
4.3 Reporting & communications: Post-Report Activities
5
5.1 Tools & code analysis: Scripting Basics
16
5.1.1 Tools & code analysis: Analyzing Scripts in Bash
13
5.1.2 Tools & code analysis: Analyzing Scripts in Powershell
15
5.1.3 Tools & code analysis: Analyzing Scripts in Python
12
5.1.4 Tools & code analysis: Analyzing Scripts in Perl
11
5.1.5 Tools & code analysis: Analyzing Scripts in Javascript
1
5.1.6 Tools & code analysis: Analyzing Scripts in Ruby
1
5.2 Tools & code analysis: Exploits and Automation
11