Category Archives: Methodologies

Pentest Methodologies

There are many Pentest Methodologies that all share the same basic approach but their phases are named differently:

  • Pre-engagement steps / Preparation / Scoping
  • Intelligence Gathering / Information Gathering / Reconnaissance (Recon) / Open source intelligence (OSINT) / Footprinting
  • Threat Modeling
  • Scanning / Mapping / Enumeration / Vulnerability Analysis / Discovery
  • Exploitation
  • Post-Exploitation / Maintaining Access / Covering Tracks
  • Reporting

Continue reading