Methodologies

Pentest Methodologies

There are many Pentest¬†Methodologies that all share the same basic approach but their phases are named differently: Pre-engagement steps / Preparation / Scoping Intelligence Gathering / Information Gathering / Reconnaissance (Recon) / Open source intelligence (OSINT) / Footprinting Threat Modeling Scanning / Mapping / Enumeration /¬†Vulnerability Analysis / Discovery Exploitation Post-Exploitation / Maintaining Access / […]Read More »