This class was created by Brainscape user Zoubida Regzal. Visit their profile to learn more about the creator.

Decks in this class (28)

1 Planning & scoping
Why is the penetration testers te...,
What is white hat,
What is grey hat
24  cards
2.1 Information gathering & Vulnerability scanning: passive reconnaissance
What is reconnaissance,
What is footprinting,
What is passive reconnaissance
76  cards
2.2.1 Information gathering & Vulnerability scanning: active reconnaissance/ scanning & recon
What is active reconnaissance,
Scanning enumeration name the typ...,
Scanning enumeration what is scan...
27  cards
2.2.2 Information gathering & Vulnerability scanning: active reconnaissance/ Detecting and Evading Defenses & Packet Crafting
Detecting and evading defenses wh...,
Detecting and evading defenses wh...,
Detecting and evading defenses wh...
27  cards
2.2.3 Information gathering & Vulnerability scanning: active reconnaissance/ Eavesdropping & wardriving
Eavesdropping what is it,
Eavesdropping what methods can yo...,
Eavesdropping what are the techni...
19  cards
2.3 Information gathering & Vulnerability scanning: Vulnerability scanning
Vulnerability scanning what is it,
Vulnerability lifecycle what is a...,
Vulnerability lifecycle what are ...
21  cards
2.4 Information gathering & Vulnerability scanning: Nmap
Nmap discovery scans what is nmap...,
Nmap discovery scans,
Nmap discovery scans give the syn...
32  cards
3.1 Attacks & exploits: Social Engineering and Physical Attacks
What is social engineering,
Methods of influence what is auth...,
Methods of influence what is urge...
35  cards
3.2 Attacks & exploits: Wireless Attacks
Wireless security when should you...,
Wireless security what is wep and...,
Wireless security
42  cards
3.3 Attacks & exploits: Network Attacks
Stress testing what is it and wha...,
Stress testing why should you do it,
Stress testing how do you do the ...
53  cards
3.4 Attacks & exploits: Application vulnerabilities
What is server side request forge...,
How to prevent from a server side...,
Race conditions what is it and ex...
51  cards
3.5 Attacks & exploits: Application attacks
Directory traversals what directo...,
Directory traversals what file in...,
Cross site scripting xss what is ...
29  cards
3.6 Attacks & exploits: Cloud attacks
Attacking the cloud what are the ...,
Attacking the cloud explain malwa...,
Attacking the cloud explain side ...
29  cards
3.7 Attacks & exploits: Attacks on Mobile Devices
Enterprise mobility management wh...,
Mobile device management mdm,
Enterprise mobility management wh...
49  cards
3.8 Attacks & exploits: Attacks on Specialized Systems
Internet of things iot devices wh...,
Internet of things iot devices wh...,
Internet of things iot devices ho...
42  cards
3.9 Attacks & exploits: Post-Exploitation Exploits
What is post exploitation phase a...,
Enumerating the network what is e...,
Enumerating the network list the ...
50  cards
3.10 Attacks & exploits: Detection Avoidance
Trojans and backdoors what is a t...,
Trojans and backdoors what is a b...,
Trojans and backdoors what is a r...
39  cards
4.1 Reporting & communications: Communication & reports
Communication paths,
Communication triggers what statu...,
Communication triggers what a cri...
23  cards
4.2 Reporting & communications: Findings & remediation
Security control categories,
Security control categories expla...,
Security control categories what ...
29  cards
4.3 Reporting & communications: Post-Report Activities
What is the purpose of post repor...,
How to ensure that shells and too...,
How to ensure the test credential...
5  cards
5.1 Tools & code analysis: Scripting Basics
Scripting tools why do you need s...,
Scripting tools,
Scripting tools
16  cards
5.1.1 Tools & code analysis: Analyzing Scripts in Bash
What kind of questions to expect ...,
Coding in bash what is bash is it...,
Coding in bash how a bash line start
13  cards
5.1.2 Tools & code analysis: Analyzing Scripts in Powershell
Coding in powershell,
Coding in powershell what is a va...,
Coding in powershell what is an a...
15  cards
5.1.3 Tools & code analysis: Analyzing Scripts in Python
Coding in python how comments are...,
Coding in python explain a variab...,
Coding in python
12  cards
5.1.4 Tools & code analysis: Analyzing Scripts in Perl
Coding in perl,
Coding in perl what is the starti...,
Coding in perl how to write comme...
11  cards
5.1.5 Tools & code analysis: Analyzing Scripts in Javascript
1  cards
5.1.6 Tools & code analysis: Analyzing Scripts in Ruby
1  cards
5.2 Tools & code analysis: Exploits and Automation
Exploits to download files using ...,
Exploits to download files using ...,
Exploits to download files using ...
11  cards

More about
Pentest+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Zoubida Regzal's Pentest+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA PenTest+
  • 30 decks
  • 195 flashcards
  • 8 learners
Decks: Pentest Methodologies, Rules Of Engagement, White Box Support Resources, And more!
Pentest+ PTO-002
  • 14 decks
  • 461 flashcards
  • 3 learners
Decks: Chapter 01 Penetration Testing, Chapter 02 Planning And Scoping Penetrat, Chapter 03 Information Gathering, And more!
Make Flashcards