CyberWolf-Security
Ctrlk
  • Home
  • Getting Started in Cyber Security
  • Misc
    • Misc Items
    • Frequency stuff
    • Random stuff - needs sorting
  • Services
    • Ports - Services
  • Password Cracking
    • Password attacks
    • Password Cracking
  • Tools
    • Tools
  • Wireless testing
    • Wireless
  • Web Application
    • Web App
  • Internals
    • Internals
  • Mobile Application
    • Mob App
  • Cloud
    • Microsoft Office 365 Security Review
    • Kubernetes & Docker Review
  • Privilege escalation
    • Windows
    • Service Execution
    • Linux
  • CTF-stuff
    • .Git
  • Steganography
    • Tools
  • Labs / Resources
    • Mitre Caldera
    • Blue-Team
    • Red-Team
  • Training
    • Certifications
      • OSCP
      • CEH
      • Crest
        • Crest CPSA
        • Crest CRT
          • Syllabus
          • Appendix B: Core Technical Skills
            • B4 - Network Mapping & Target Identification
            • B5 - Interpreting Tool Output
            • B8 - OS Fingerprinting
            • B9 - Application Fingerprinting and Evaluating Unknown Services
            • B13 - File System Permissions
          • Appendix C: Background Information Gathering & Open Source
          • Appendix D: Networking Equipment
          • Appendix E: Microsoft Windows Security Assessment
          • Appendix F: Unix Security Assessment
          • Appendix G: Web Technologies
          • Appendix I: Web Testing Techniques
          • Appendix J: Databases
      • Study Material
    • Terminology
  • Vulnerabilities
    • Vulnerabilities
  • Exploits
    • ImageMagick
    • CVE-2021-3560 (PolKit)
  • Bug Bounty
    • Bug Bounty Programs
    • Sub Domain Finder
    • link dump
  • FAQ
    • Install ALFA AWUS1900 on Kali
    • Update and upgrade Linux
  • Build Review
    • Workstation
  • Hack the Box
    • Challenges
Powered by GitBook
On this page

Was this helpful?

  1. Training
  2. Certifications
  3. Crest
  4. Crest CRT

Appendix B: Core Technical Skills

B4 - Network Mapping & Target IdentificationB5 - Interpreting Tool OutputB8 - OS FingerprintingB9 - Application Fingerprinting and Evaluating Unknown ServicesB13 - File System Permissions
PreviousSyllabusNextB4 - Network Mapping & Target Identification

Last updated 3 years ago

Was this helpful?