TCM Security - Practical Ethical Hacking

This class was created by Brainscape user Marcelo Aiache. Visit their profile to learn more about the creator.

Decks in this class (14)

Networking Refresher Section Quiz
Which layer of the osi model do i...,
Which technology prevents us from...,
Which layer of the osi model do m...
13  cards
Introduction to Linux
What does the command pwd do 1,
Which command would you use to li...,
What does the file permission rwx...
11  cards
Stages of Ethical Hacking
Describe all the stages 1
1  cards
Information Gathering (Reconnaissance)
Why is it important to validate y...,
When searching for company emails...,
True or false a form of validatin...
10  cards
Scanning & Enumeration
How to tell nmap to scan all ports 1,
The ss scan is really stealth now...,
How to make an udp scan should yo...
4  cards
Exploitation Basics
What is a reverse shell 1,
What is a bind shell 2,
What is a metasploit payload 3
9  cards
Introduction to Exploit Development (Buffer Overflows)
Describe the anatomy of the stack...,
What is the main idea of a stack ...,
What is the difference between fu...
14  cards
Active Directory Overview
What is active directory 1,
What is a domain controller 2,
What are some of the most importa...
14  cards
Attacking Active Directory: Initial Attack Vectors
What is llmnr 1,
How does llmnr work what is the k...,
What is llmnr poisoning 3
16  cards
Active Directory: Post-Compromise Enumeration
When using a powershell script li...,
What command can be used to see a...,
What command can be used to see l...
6  cards
Active Directory: Post-Compromise Attacks
What is crackmapexec 1,
What is a pass the password attack 2,
What command can be used to perfo...
18  cards
Post Exploitation (Basics)
What is pivoting 1,
What is the main goal of a clean ...,
What is the main goal of a clean ...
4  cards
Web Application Enumeration
Cite two tools that are used for ...,
What is httprobe 2,
Why is it a better practice to us...
4  cards
Attacking Web Apps
What is union select how it can b...,
What is blind sql injection 2,
What is a content based blind sql...
23  cards

More about
TCM Security - Practical Ethical Hacking

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Marcelo Aiache's TCM Security - Practical Ethical Hacking flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Ethical Hacking
  • 10 decks
  • 374 flashcards
  • 987 learners
Decks: Quiz 1 2, Quiz 3, Quiz 4, And more!
Ethical Hacker
  • 22 decks
  • 585 flashcards
  • 330 learners
Decks: Chapter 1 Introduction To Ethical Hackin, Chapter 0 Random Terms, Chapter 2 System Fundamentals, And more!
Make Flashcards