Metasploit, event viewer (syslogs), there are so many really. It all depends on what you are doing. We use ACAS, SECSCN and WASSP. There are also several IDS/IPS that you can know in order to bypass craft an attack that one be detected, etc.
The switches and also what types of responses you get when you hit a closed port, open port, if there is a firewall.
Completed: CISSP, GPEN, GWAPT, CCSA R80, eJPT, CySA+, M.S. Information Security Current Goal: CCSE Continuous Education Plan: AWS-SAA, OSCP, CISM Book/CBT/Study Material: Max Power
Comments
The switches and also what types of responses you get when you hit a closed port, open port, if there is a firewall.
Current Goal: CCSE
Continuous Education Plan: AWS-SAA, OSCP, CISM
Book/CBT/Study Material: Max Power
The Blueprint mentions tools such as WireShark, Airsnort, NMAP, Nessus, Retina, Foundstone and Ecora. Know those ones well for sure.
You probably wont need to know/use them as thoroughly as WireShark and NMAP though.
Nah, v10. Wouldn't want to get too historical at this point.
Actually neither, I was asking for V8.5 of the exam