
There are many Pentest Methodologies that all share the same basic approach but their phases are named differently: Pre-engagement steps / Preparation / Scoping Intelligence Gathering / Information Gathering / Reconnaissance (Recon) / Open source intelligence (OSINT) / Footprinting Threat Modeling Scanning / Mapping / Enumeration / Vulnerability Analysis / Discovery Exploitation Post-Exploitation / Maintaining Access / […]
Read More »