This class was created by Brainscape user Adam Klein. Visit their profile to learn more about the creator.

Decks in this class (56)

1A: Define Organizational Pentesting
1.2 Explain the importance of scoping and organizational/customer requirements. 4.3 Explain the importance of communication during the penetration testing process.
14  cards
1B: Acknowledge Compliance Requirements
1.1 Compare and contrast governance, risk, and compliance reports.
13  cards
1C: Compare Standards and Methodologies
1.2 Explain the importance of scoping and organizational/customer requirements.  2.1 Given a scenario, perform passive reconnaissance.
9  cards
2A: Assess Environmental Considerations
1.1 Compare and contrast governance, risk, and compliance reports.  1.2 Explain the importance of scoping and organizational/customer requirements.
4  cards
2B: Outline the Rules of Engagement
1.2 Explain the importance of scoping and organizational/customer requirements. 1.3 Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity.
8  cards
2C: Prepare Legal Documents
1.1 Compare and contrast governance, risk, and compliance reports. 
7  cards
3A: Discover the Target
2.1 Given a scenario, perform passive reconnaissance. 5.3 Explain use cases of the following tools during the phases of a penetration test.
2  cards
3C: Compile Website Information
2.1 Given a scenario, perform passive reconnaissance. 2.2 Given a scenario, perform active reconnaissance. 2.3 Given a scenario, analyze the results of a reconnaissance exercise. 5.3 Explain use cases of the following tools during the phases of a penetration test.
2  cards
3D: Discover Open-Source Intelligence Tools
2.1 Given a scenario, perform passive reconnaissance. 5.3 Explain use cases of the following tools during the phases of a penetration test.
1  cards
4A: Exploit the Human Psyche
3.6 Given a scenario, perform a social engineering or physical attack.
14  cards
4B: Summarize Physical Attacks
3.6 Given a scenario, perform a social engineering or physical attack.
8  cards
5A: Plan the Vulnerability Scan
2.2 Given a scenario, perform active reconnaissance. 2.4 Given a scenario, perform vulnerability scanning. 3.2 Given a scenario, research attack vectors and perform wireless attacks. 3.7 Given a scenario, perform post-exploitation techniques.
7  cards
5B: Detect Defenses
2.2 Given a scenario, perform active reconnaissance.
3  cards
5C: Utilize Scanning Tools
2.2 Given a scenario, perform active reconnaissance. 5.3 Explain use cases of the following tools during the phases of a penetration test.
2  cards
6A: Scan Identified Targets
2.4 Given a scenario, perform vulnerability scanning. 5.3 Explain use cases of the following tools during the phases of a penetration test.
3  cards
6B: Evaluate Network Traffic
2.2 Given a scenario, perform active reconnaissance. 2.3 Given a scenario, analyze the results of a reconnaissance exercise. 3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
4  cards
6C: Uncover Wireless Assets
2.2 Given a scenario, perform active reconnaissance. 3.2 Given a scenario, research attack vectors and perform wireless attacks. 5.3 Explain use cases of the following tools during the phases of a penetration test.
4  cards
7A: Discover Nmap and NSE
2.3 Given a scenario, analyze the results of a reconnaissance exercise. 2.4 Given a scenario, perform vulnerability scanning. 3.2 Given a scenario, research attack vectors and perform wireless attacks.
6  cards
7B: Enumerate Network Hosts
2.4 Given a scenario, perform vulnerability scanning. 3.2 Given a scenario, research attack vectors and perform wireless attacks.
2  cards
7C: Analyze Output from Scans
2.3 Given a scenario, analyze the results of a reconnaissance exercise. 3.1 Given a scenario, research attack vectors and perform wireless attacks.
4  cards
8A: Avoid Detection
2.2 Given a scenario, perform active reconnaissance. 3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
9  cards
8B: Use Steganography to Hide and Conceal
3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
5  cards
8C: Establish a Covert Chanel
3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
2  cards
9B: Attack LAN Protocols
2.2 Given a scenario, perform active reconnaissance. 3.1 Given a scenario, research attack vectors and perform network attacks.
5  cards
9C: Compare Exploit Tools
3.1 Given a scenario, research attack vectors and perform network attacks. 5.3 Explain use cases of the following tools during the phases of a penetration test.
3  cards
9D: Discover Cloud Vulnerabilities
2.2 Given a scenario, perform active reconnaissance. 3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
2  cards
9E: Cloud-Based Attacks
3.4 Given a scenario, research attack vectors and perform attacks on cloud technologies.
7  cards
10A: Discover Wireless Attacks
3.2 Given a scenario, research attack vectors and perform wireless attacks. 5.3 Explain use cases of the following tools during the phases of a penetration test.
10  cards
10B: Explore Wireless Tools
3.2 Given a scenario, research attack vectors and perform wireless attacks. 5.3 Explain use cases of the following tools during the phases of a penetration test.
10  cards
11A: Recognize Mobile Device Vulnerabilities
3.5 Explain common attacks and vulnerabilities against specialized systems
9  cards
11B: Launch Attacks on Mobile Devices
3.2 Given a scenario, research attack vectors and perform wireless attacks. 3.5 Explain common attacks and vulnerabilities against specialized systems.
3  cards
11C: Outline Assessment Tools for Mobile Devices
3.5 Explain common attacks and vulnerabilities against specialized systems.
2  cards
12A: Identify Attacks on the IoT
3.5 Explain common attacks and vulnerabilities against specialized systems. 
3  cards
12B: Recognize Other Vulnerable Systems
3.5 Explain common attacks and vulnerabilities against specialized systems.
4  cards
12C: Explain Virtual Machine Vulnerabilities
3.5 Explain common attacks and vulnerabilities against specialized systems.
6  cards
13A: Recognize Web Vulnerabilities
3.3 Given a scenario, research attack vectors and perform application-based attacks. 3.5 Explain common attacks and vulnerabilities against specialized systems.
1  cards
13B: Launch Session Attacks
3.3 Given a scenario, research attack vectors and perform application-based attacks.  3.7 Given a scenario, perform post-exploitation techniques.
9  cards
13C: Plan Injection Attacks
2.2 Given a scenario, perform active reconnaissance. 3.3 Given a scenario, research attack vectors and perform application-based attacks. 3.5 Explain common attacks and vulnerabilities against specialized systems
14  cards
13D: Identify Tools
3.3 Given a scenario, research attack vectors and perform application-based attacks. 3.6 Given a scenario, perform a social engineering or physical attack. 5.3 Explain use cases of the following tools during the phases of a penetration test.
13  cards
14A: System Hacking
3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
5  cards
14B: Use Remote Access Tools
3.1 Given a scenario, research attack vectors and perform network attacks. 5.3 Explain use cases of the following tools during the phases of a penetration test.
5  cards
14C: Analyze Exploit Code
3.1 Given a scenario, research attack vectors and perform attacks on cloud technologies. 5.2 Given a scenario, analyze script or code sample for use in a penetration test.
12  cards
15A: Analyzing Scripts and Code Samples
5.2 Given a scenario, analyze a script or code sample for use in a penetration test.
10  cards
15B: Create Logic Constructs
5.1 Explain the basic concepts of scripting and software development.
7  cards
15C: Automate Penetration Testing
5.2 Given a scenario, analyze a script or code sample for use in a penetration test.
2  cards
16A: Test Credentials
3.1 Given a scenario, research attack vectors and perform network attacks. 5.3 Explain use cases of the following tools during the phases of a penetration test.
14  cards
16B: Move Throughout the System
3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
2  cards
16C: Maintain Persistence
3.7 Given a scenario, perform post-exploitation techniques.
7  cards
17A: Define the Communication Path
4.3 Explain the importance of communication during the penetration testing process.
3  cards
17B: Communication Triggers
4.3 Explain the importance of communication during the penetration testing process.
6  cards
18A: Identify Report Audience
4.1 Compare and contrast the important components of written reports.
4  cards
18B: List Report Contents
4.1 Compare and contrast important components of written reports.
10  cards
19A: Employ Technical Controls
3.5 Explain common attacks and vulnerabilities against specialized systems. 4.2 Given a scenario, analyze the findings and recommend the appropriate remediation within a report.
10  cards
19B: Administrative and Operational Controls
4.2 Given a scenario, analyze the findings and recommend the appropriate remediation within a report.
6  cards
20A: Post Engagement Cleanup
4.4 Explain post-report delivery activities.
1  cards
20B: Follow Up Actions
4.4 Explain post-report delivery activities.
3  cards

More about
Pentesting

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Adam Klein's Pentesting flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Pentest+ PTO-002
  • 14 decks
  • 461 flashcards
  • 3 learners
Decks: Chapter 01 Penetration Testing, Chapter 02 Planning And Scoping Penetrat, Chapter 03 Information Gathering, And more!
Pentest+ PT0-002
  • 9 decks
  • 290 flashcards
  • 13 learners
Decks: Planning And Engagement, Information Gathering And Vulnerability, Network Based Attacks, And more!
Make Flashcards