Reconnaissance, Scanning, and Enumeration
Network scanning with Nmap, SMB security, cloud asset discovery, Netcat, and Sigma detection rules.
5 minutes
5 Questions
Reconnaissance, Scanning, and Enumeration are the first three critical phases of the cyber attack lifecycle, fundamental to the GIAC Certified Incident Handler (GCIH) body of knowledge. **Reconnaissance** is the initial phase where an attacker gathers information about a target without directly in…
Concepts covered
Port Scanning Techniques and AnalysisOS Fingerprinting MethodsNetwork Access ManipulationSMB Share Discovery and ExploitationSMB Vulnerability MitigationCloud Asset Discovery and Shadow ITDefending Against ReconnaissanceNmap Host Discovery and ScanningService and Version EnumerationNetcat for Offensive and Defensive UseSMB Protocol and FeaturesSigma Rules and Hayabusa Detection
Test mode:
More Reconnaissance, Scanning, and Enumeration questions
720 questions (total)