Table of Contents

PenTest Methodology

Six Stages

During a PenTest you generally follow these six steps:

  1. Pre-Engagement: Planning & Scope
  2. Recon: Information Gathering
  3. Scanning
  4. Exploitation
  5. Post-Exploitation
  6. Post-Engagement: Report

Essential

Most important out of the six:

  1. Recon (info gathering)
  2. Scanning & Enumeration

Enumeration

All enumeration means is “build a list.” You enumerate throughout this process; enumeration is essential for a successful hack.

Methodology Resources

Here are some frameworks, methodologies, standards, and examples to use when you build out your own PetTesting process:

  1. The MITRE ATT&CK Framework: Adversarial Tactics, Techniques & Common Knowledge
    • The most comprehensive free database of hacking information (concepts and practices) available.
    • It is not a pentesting standard or outline. It is a knowledge base of descriptions, definitions, and examples.
  2. OWASP: Open Web Application Security Project
    • Provides pentesting guides for web security, mobile security, and firmware.
    • Also provides advice on how to use other testing methodologies and standards.
  3. PTES: Penetration Testing Execution Standard
    • One of the most complete modern and openly available pentesting standards.
    • Includes pre-engagement interactions (scoping, questions for clients, details on dealing with third parties, etc.).
    • Provides a full range of pentesting techniques and concepts.
  4. OSSTMM: Open Source Security Testing Methodology Manual (outdated)
  5. NIST: National Institute of Standards and Technology (outdated)
  6. ISSAF: Information Systems Security Assessment Framework (outdated)

Practice

VulnHub

VulnHub has a lot of practice machines you can download.

List of VulHub machines similar to OSCP:

TryHackMe

Cyber security training through short, gamified, real-world labs. Content for complete beginners and seasoned hackers.

Hack The Box

A Massive Hacking Playground