Methodologies

Pentest Methodologies

There are many Pentest┬áMethodologies that all share the same basic approach but their phases are named differently: Pre-engagement steps / Preparation / Scoping Intelligence Gathering / Information Gathering / Reconnaissance (Recon) / Open source intelligence (OSINT) / Footprinting Threat Modeling Scanning / Mapping / Enumeration /┬áVulnerability Analysis / Discovery Exploitation Post-Exploitation / Maintaining Access / […]Read More »