method_0_intro
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
method_0_intro [2020/09/25 02:10] – gman | method_0_intro [2022/12/31 00:16] (current) – [Methodology Resources] gman | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | You go through each of these five stages during ever pentest you do. | + | ===== Six Stages ===== |
+ | |||
+ | **During a PenTest you generally follow these six steps: ** | ||
+ | - Pre-Engagement: | ||
+ | - Recon: Information Gathering | ||
+ | - Scanning | ||
+ | - Exploitation | ||
+ | - Post-Exploitation | ||
+ | - Post-Engagement: | ||
+ | |||
+ | ===== Essential ===== | ||
+ | |||
+ | **Most important out of the six: ** | ||
+ | - Recon (info gathering) | ||
+ | - Scanning & Enumeration | ||
+ | |||
+ | * If you do those two right and well, you should have no problem getting to where you need to go. | ||
+ | * Therefore, if you are having problems getting to where you need to go, you probably missed something in your scanning and enumeration. | ||
+ | |||
+ | ===== Enumeration ===== | ||
+ | |||
+ | All // | ||
+ | |||
+ | ===== Methodology Resources ===== | ||
+ | |||
+ | Here are some frameworks, methodologies, | ||
+ | |||
+ | - [[https:// | ||
+ | * The most comprehensive free database | ||
+ | * It is not a pentesting standard or outline. It is a knowledge base of descriptions, | ||
+ | - [[https:// | ||
+ | * Provides pentesting guides for web security, mobile security, and firmware. | ||
+ | * Also provides advice on how to use other testing methodologies and standards. | ||
+ | - [[http:// | ||
+ | * One of the most complete modern and openly available pentesting standards. | ||
+ | * Includes pre-engagement interactions (scoping, questions for clients, details on dealing with third parties, etc.). | ||
+ | * Provides a full range of pentesting techniques and concepts. | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ====== Practice ====== | ||
+ | |||
+ | ===== VulnHub ===== | ||
+ | |||
+ | VulnHub has a lot of practice machines | ||
+ | * VulnHub machines are virtual machines (VMs) and are built for VMWare. | ||
+ | * Debian 10 (Buster) runs VMWare Workstation fine. Debian 11 (Bullseye)... not so much. | ||
+ | |||
+ | List of VulHub machines similar to OSCP: | ||
+ | * [[https:// | ||
+ | |||
+ | ===== TryHackMe ===== | ||
+ | |||
+ | Cyber security training through short, gamified, real-world labs. Content for complete beginners and seasoned hackers. | ||
+ | * [[https:// | ||
+ | * [[prac_app_tryhackme| Write-Ups]] | ||
+ | |||
+ | ===== Hack The Box ===== | ||
+ | |||
+ | A Massive Hacking Playground | ||
+ | * [[https:// | ||
+ | * [[prac_app_htb| Write-Ups]] | ||
+ | |||
+ | ---- | ||
- | - Reconnaissance (active vs. passive) | ||
- | - Active: Actually engage the target | ||
- | - Passive: Googling, etc. (not directly against the target) | ||
- | - Scanning & Enumeration (Nmpa, Nessus, Nikto, etc.) | ||
- | - Exploitation (gaining access) | ||
- | - Maintaining Access | ||
- | - Covering Your Tracks (clean up what you did, create, broke, etc.) | ||
- | Lather, rinse, repeat... |
method_0_intro.1600999822.txt.gz · Last modified: by gman