This class was created by Brainscape user Zoubida Regzal. Visit their profile to learn more about the creator.

Decks in this class (28)

1 Planning & scoping
Why is the penetration testers te...,
What is white hat 2,
What is grey hat 3
23  cards
2.1 Information gathering & Vulnerability scanning: passive reconnaissance
What is reconnaissance 1,
What is footprinting 2,
What is passive reconnaissance 3
76  cards
2.2.1 Information gathering & Vulnerability scanning: active reconnaissance/ scanning & recon
What is active reconnaissance 1,
Scanning enumeration name the typ...,
Scanning enumeration what is scan...
27  cards
2.2.2 Information gathering & Vulnerability scanning: active reconnaissance/ Detecting and Evading Defenses & Packet Crafting
Detecting and evading defenses wh...,
Detecting and evading defenses wh...,
Detecting and evading defenses wh...
27  cards
2.2.3 Information gathering & Vulnerability scanning: active reconnaissance/ Eavesdropping & wardriving
Eavesdropping what is it 1,
Eavesdropping what methods can yo...,
Eavesdropping what are the techni...
19  cards
2.3 Information gathering & Vulnerability scanning: Vulnerability scanning
Vulnerability scanning what is it 1,
Vulnerability lifecycle what is a...,
Vulnerability lifecycle what are ...
21  cards
2.4 Information gathering & Vulnerability scanning: Nmap
Nmap discovery scans what is nmap...,
Nmap discovery scans give the bas...,
Nmap discovery scans give the syn...
32  cards
3.1 Attacks & exploits: Social Engineering and Physical Attacks
What is social engineering 1,
Methods of influence what is auth...,
Methods of influence what is urge...
35  cards
3.2 Attacks & exploits: Wireless Attacks
Wireless security when should you...,
Wireless security what is wep and...,
Wireless security what is wpa and...
42  cards
3.3 Attacks & exploits: Network Attacks
Stress testing what is it and wha...,
Stress testing why should you do ...,
Stress testing how do you do the ...
53  cards
3.4 Attacks & exploits: Application vulnerabilities
What is server side request forge...,
How to prevent from a server side...,
Race conditions what is it and ex...
51  cards
3.5 Attacks & exploits: Application attacks
Directory traversals what directo...,
Directory traversals what file in...,
Cross site scripting xss what is ...
29  cards
3.6 Attacks & exploits: Cloud attacks
Attacking the cloud what are the ...,
Attacking the cloud explain malwa...,
Attacking the cloud explain side ...
29  cards
3.7 Attacks & exploits: Attacks on Mobile Devices
Enterprise mobility management wh...,
Enterprise mobility management wh...,
Enterprise mobility management wh...
49  cards
3.8 Attacks & exploits: Attacks on Specialized Systems
Internet of things iot devices wh...,
Internet of things iot devices wh...,
Internet of things iot devices ho...
42  cards
3.9 Attacks & exploits: Post-Exploitation Exploits
What is post exploitation phase a...,
Enumerating the network what is e...,
Enumerating the network list the ...
50  cards
3.10 Attacks & exploits: Detection Avoidance
Trojans and backdoors what is a t...,
Trojans and backdoors what is a b...,
Trojans and backdoors what is a r...
39  cards
4.1 Reporting & communications: Communication & reports
Communication paths who are the p...,
Communication triggers what statu...,
Communication triggers what a cri...
23  cards
4.2 Reporting & communications: Findings & remediation
Security control categories defin...,
Security control categories expla...,
Security control categories what ...
29  cards
4.3 Reporting & communications: Post-Report Activities
What is the purpose of post repor...,
How to ensure that shells and too...,
How to ensure the test credential...
5  cards
5.1 Tools & code analysis: Scripting Basics
Scripting tools what is a script ...,
Scripting tools list the basic sc...,
Scripting tools explain bash and ...
16  cards
5.1.1 Tools & code analysis: Analyzing Scripts in Bash
What kind of questions to expect ...,
Coding in bash what is bash is it...,
Coding in bash how a bash line st...
13  cards
5.1.2 Tools & code analysis: Analyzing Scripts in Powershell
Coding in powershell how comment ...,
Coding in powershell what is a va...,
Coding in powershell what is an a...
15  cards
5.1.3 Tools & code analysis: Analyzing Scripts in Python
Coding in python how comments are...,
Coding in python explain a variab...,
Coding in python explain an array...
12  cards
5.1.4 Tools & code analysis: Analyzing Scripts in Perl
Coding in perl what is perl 1,
Coding in perl what is the starti...,
Coding in perl how to write comme...
11  cards
5.1.5 Tools & code analysis: Analyzing Scripts in Javascript
Blank 1
1  cards
5.1.6 Tools & code analysis: Analyzing Scripts in Ruby
Blank 1
1  cards
5.2 Tools & code analysis: Exploits and Automation
Exploits to download files using ...,
Exploits to download files using ...,
Exploits to download files using ...
11  cards

More about
Pentest+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Zoubida Regzal's Pentest+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

PenTest+
  • 80 decks
  • 3904 flashcards
  • 497 learners
Decks: Jason Dion S Pentest Course Practice Exa, Comptia Pentest Pt0 001 Practice Certifi, Comptia Pentest Pt0 001 Practice Certifi, And more!
PenTest+
  • 19 decks
  • 771 flashcards
  • 2 learners
Decks: Wiley Assessment Test Missed Items, Chap 1 Penetration Testing, Chap 2 Planning And Scoping Penetration, And more!
Make Flashcards