Reconnaissance, Scanning, and Enumeration

Network scanning with Nmap, SMB security, cloud asset discovery, Netcat, and Sigma detection rules.

Explores attacker reconnaissance techniques including network scanning with Nmap, host discovery, service enumeration, and vulnerability identification across Windows, Linux, Azure, and AWS targets. Covers SMB protocol security including share discovery, exploitation, and relay attacks. Includes cloud-specific scanning for shadow IT discovery, network access manipulation techniques, Netcat usage for offensive and defensive operations, and detection using Hayabusa and Sigma rules. Maps to GIAC objectives: Scanning and Mapping, SMB Security, and Detecting Exploitation and Covert Communications Tools. (~20% of exam)
5 minutes 5 Questions

Reconnaissance, Scanning, and Enumeration are the first three critical phases of the cyber attack lifecycle, fundamental to the GIAC Certified Incident Handler (GCIH) body of knowledge. **Reconnaissance** is the initial phase where an attacker gathers information about a target without directly in…

Concepts covered: Port Scanning Techniques and Analysis, OS Fingerprinting Methods, Network Access Manipulation, SMB Share Discovery and Exploitation, SMB Vulnerability Mitigation, Cloud Asset Discovery and Shadow IT, Defending Against Reconnaissance, Nmap Host Discovery and Scanning, Service and Version Enumeration, Netcat for Offensive and Defensive Use, SMB Protocol and Features, Sigma Rules and Hayabusa Detection

Test mode:
More Reconnaissance, Scanning, and Enumeration questions
720 questions (total)