• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

NMAP/ ZENMAP

Network scanning tools that provide information about open ports of a system to determine vulnerabilities


NMAP is command line and zenmap is a GUI version

BRUTER

A GUI based brute force tool used by hackers , to obtain passwords of users; using a list of commonly used passwords by using a dictionary attack

What are the cycles of Incident response Life Cycle

Preparation


Detection and analysis


Containment, eradicate and recovery


Post incident activity

Netstat

A command line tool in windows and linux that provides connection information

Tasklist

Windows command that’s shows running task

Md5sum

A hashing tool. Used in Linux

Kali linux

Is a Linux distribution created for digital forensics and penetration

Metasploit

A penetration testing framework that comes loaded on kali Linux; that provides tools for penetration testers to improve security assessments & awareness

Meterpreter

A Metaspolit payload that provides an interactive shell from which an attacker can explore the target machine and execute code.



Resides in memory

Binwalk

An analysis tool used to analyze and find executable code and embedded files inside binary files. and extract firmware images