PenTest Methodology
Six Stages
During a PenTest you generally follow these six steps:
Pre-Engagement: Planning & Scope
Recon: Information Gathering
Scanning
Exploitation
Post-Exploitation
Post-Engagement: Report
Essential
Most important out of the six:
Recon (info gathering)
Scanning & Enumeration
If you do those two right and well, you should have no problem getting to where you need to go.
Therefore, if you are having problems getting to where you need to go, you probably missed something in your scanning and enumeration.
Enumeration
All enumeration means is “build a list.” You enumerate throughout this process; enumeration is essential for a successful hack.
Methodology Resources
Here are some frameworks, methodologies, standards, and examples to use when you build out your own PetTesting process:
-
The most comprehensive free database of hacking information (concepts and practices) available.
It is not a pentesting standard or outline. It is a knowledge base of descriptions, definitions, and examples.
OWASP: Open Web Application Security Project
Provides pentesting guides for web security, mobile security, and firmware.
Also provides advice on how to use other testing methodologies and standards.
PTES: Penetration Testing Execution Standard
One of the most complete modern and openly available pentesting standards.
Includes pre-engagement interactions (scoping, questions for clients, details on dealing with third parties, etc.).
Provides a full range of pentesting techniques and concepts.
OSSTMM: Open Source Security Testing Methodology Manual (outdated)
NIST: National Institute of Standards and Technology (outdated)
ISSAF: Information Systems Security Assessment Framework (outdated)
Practice
VulnHub
VulnHub has a lot of practice machines you can download.
List of VulHub machines similar to OSCP:
TryHackMe
Cyber security training through short, gamified, real-world labs. Content for complete beginners and seasoned hackers.
Hack The Box
A Massive Hacking Playground