method_0_intro
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
method_0_intro [2020/09/25 02:11] – gman | method_0_intro [2022/12/31 00:16] (current) – [Methodology Resources] gman | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | You go through each of these five stages during ever pentest you do. | + | ===== Six Stages ===== |
- | - Reconnaissance (active vs. passive) | + | **During a PenTest you generally follow these six steps: ** |
- | - Active: Actually engage the target | + | - Pre-Engagement: Planning & Scope |
- | - Passive: Googling, etc. (not directly against the target) | + | - Recon: Information Gathering |
- | - Scanning | + | - Scanning |
- | - Exploitation | + | - Exploitation |
- | - Maintaining Access | + | - Post-Exploitation |
- | - Covering Your Tracks (clean up what you did, create, broke, etc.) | + | - Post-Engagement: |
- | Lather, rinse, repeat... | + | ===== Essential ===== |
- | **Most important out of the five: ** | + | **Most important out of the six: ** |
- Recon (info gathering) | - Recon (info gathering) | ||
- Scanning & Enumeration | - Scanning & Enumeration | ||
- | If you do those two right and well, you should have no problem getting to where you need to go. | + | * If you do those two right and well, you should have no problem getting to where you need to go. |
+ | * Therefore, if you are having problems getting to where you need to go, you probably missed something in your scanning and enumeration. | ||
- | Therefore, if you are having problems getting | + | ===== Enumeration ===== |
+ | |||
+ | All // | ||
+ | |||
+ | ===== Methodology Resources ===== | ||
+ | |||
+ | Here are some frameworks, methodologies, | ||
+ | |||
+ | - [[https:// | ||
+ | * The most comprehensive free database of hacking information (concepts and practices) available. | ||
+ | * It is not a pentesting standard or outline. It is a knowledge base of descriptions, | ||
+ | - [[https:// | ||
+ | * Provides pentesting guides for web security, mobile security, and firmware. | ||
+ | * Also provides advice on how to use other testing methodologies and standards. | ||
+ | - [[http:// | ||
+ | * One of the most complete modern and openly available pentesting standards. | ||
+ | * Includes pre-engagement interactions (scoping, questions for clients, details on dealing with third parties, etc.). | ||
+ | * Provides a full range of pentesting techniques and concepts. | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ====== Practice ====== | ||
+ | |||
+ | ===== VulnHub ===== | ||
+ | |||
+ | VulnHub has a lot of practice machines | ||
+ | * VulnHub machines are virtual machines (VMs) and are built for VMWare. | ||
+ | * Debian 10 (Buster) runs VMWare Workstation fine. Debian 11 (Bullseye)... not so much. | ||
+ | |||
+ | List of VulHub machines similar to OSCP: | ||
+ | * [[https:// | ||
+ | |||
+ | ===== TryHackMe ===== | ||
+ | |||
+ | Cyber security training through short, gamified, real-world labs. Content for complete beginners and seasoned hackers. | ||
+ | * [[https:// | ||
+ | * [[prac_app_tryhackme| Write-Ups]] | ||
+ | |||
+ | ===== Hack The Box ===== | ||
+ | |||
+ | A Massive Hacking Playground | ||
+ | * [[https:// | ||
+ | * [[prac_app_htb| Write-Ups]] | ||
+ | |||
+ | ---- | ||
method_0_intro.1600999910.txt.gz · Last modified: by gman