TCM Security - Practical Ethical Hacking

This class was created by Brainscape user Marcelo Aiache. Visit their profile to learn more about the creator.

Decks in this class (14)

Networking Refresher Section Quiz
Which layer of the osi model do i...,
Which technology prevents us from...,
Which layer of the osi model do m...
13  cards
Introduction to Linux
Select the right alternativewhat ...,
Which command would you use to li...,
What does the file permission rwx...
11  cards
Stages of Ethical Hacking
Describe all the stages
1  cards
Information Gathering (Reconnaissance)
Why is it important to validate y...,
When searching for company emails...,
True or false a form of validatin...
10  cards
Scanning & Enumeration
How to tell nmap to scan all ports,
True or falsethe ss scan is reall...,
How to make an udp scan should yo...
4  cards
Exploitation Basics
What is a reverse shell,
What is a bind shell,
What is a metasploit payload
9  cards
Introduction to Exploit Development (Buffer Overflows)
Describe the anatomy of the stack...,
What is the main idea of a stack ...,
What is the difference between fu...
14  cards
Active Directory Overview
What is active directory,
What is a domain controller,
What are some of the most importa...
14  cards
Attacking Active Directory: Initial Attack Vectors
In the context of active director...,
How does llmnr work what is the k...,
What is llmnr poisoning
16  cards
Active Directory: Post-Compromise Enumeration
When using a powershell script li...,
Using powerviewwhat command can b...,
Using pwerviewwhat command can be...
6  cards
Active Directory: Post-Compromise Attacks
What is crackmapexec,
What is a pass the password attack,
What command can be used to perfo...
18  cards
Post Exploitation (Basics)
What is pivoting,
What is the main goal of cleaning...,
What is the main goal of a clean up
4  cards
Web Application Enumeration
Cite two tools that are used for ...,
What is httprobe,
Why is it a better practice to us...
4  cards
Attacking Web Apps
Sql injectionwhat is union select...,
What is blind sql injection,
What is a content based blind sql...
23  cards

More about
TCM Security - Practical Ethical Hacking

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Marcelo Aiache's TCM Security - Practical Ethical Hacking flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Ethical Hacking
  • 10 decks
  • 374 flashcards
  • 981 learners
Decks: Quiz 1 2, Quiz 3, Quiz 4, And more!
Ethical Hacker
  • 22 decks
  • 585 flashcards
  • 330 learners
Decks: Chapter 1 Introduction To Ethical Hackin, Chapter 0 Random Terms, Chapter 2 System Fundamentals, And more!
Make Flashcards