method_0_intro
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
method_0_intro [2022/09/24 14:55] – [Five Stages of a Hack] gman | method_0_intro [2022/12/31 00:16] (current) – [Methodology Resources] gman | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== PenTest Methodology ====== | ====== PenTest Methodology ====== | ||
- | During a PenTest you generally follow these six steps: | + | ===== Six Stages ===== |
+ | |||
+ | **During a PenTest you generally follow these six steps: | ||
- Pre-Engagement: | - Pre-Engagement: | ||
- Recon: Information Gathering | - Recon: Information Gathering | ||
Line 8: | Line 10: | ||
- Post-Exploitation | - Post-Exploitation | ||
- Post-Engagement: | - Post-Engagement: | ||
+ | |||
+ | ===== Essential ===== | ||
**Most important out of the six: ** | **Most important out of the six: ** | ||
Line 13: | Line 17: | ||
- Scanning & Enumeration | - Scanning & Enumeration | ||
- | If you do those two right and well, you should have no problem getting to where you need to go. | + | * If you do those two right and well, you should have no problem getting to where you need to go. |
+ | * Therefore, if you are having problems getting to where you need to go, you probably missed something in your scanning and enumeration. | ||
- | Therefore, if you are having problems getting to where you need to go, you probably missed something in your scanning and enumeration. | + | ===== Enumeration ===== |
- | **Enumeration: | + | All // |
+ | |||
+ | ===== Methodology Resources ===== | ||
+ | |||
+ | Here are some frameworks, methodologies, | ||
+ | |||
+ | - [[https:// | ||
+ | * The most comprehensive free database of hacking information (concepts and practices) available. | ||
+ | * It is not a pentesting standard or outline. It is a knowledge base of descriptions, | ||
+ | - [[https:// | ||
+ | * Provides pentesting guides for web security, mobile security, and firmware. | ||
+ | * Also provides advice on how to use other testing methodologies and standards. | ||
+ | - [[http:// | ||
+ | * One of the most complete modern and openly available pentesting standards. | ||
+ | * Includes pre-engagement interactions (scoping, questions for clients, details on dealing with third parties, etc.). | ||
+ | * Provides a full range of pentesting techniques and concepts. | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
---- | ---- | ||
====== Practice ====== | ====== Practice ====== | ||
+ | |||
+ | ===== VulnHub ===== | ||
VulnHub has a lot of practice machines you can download. | VulnHub has a lot of practice machines you can download. | ||
Line 29: | Line 54: | ||
List of VulHub machines similar to OSCP: | List of VulHub machines similar to OSCP: | ||
* [[https:// | * [[https:// | ||
+ | |||
+ | ===== TryHackMe ===== | ||
+ | |||
+ | Cyber security training through short, gamified, real-world labs. Content for complete beginners and seasoned hackers. | ||
+ | * [[https:// | ||
+ | * [[prac_app_tryhackme| Write-Ups]] | ||
+ | |||
+ | ===== Hack The Box ===== | ||
+ | |||
+ | A Massive Hacking Playground | ||
+ | * [[https:// | ||
+ | * [[prac_app_htb| Write-Ups]] | ||
---- | ---- | ||
- | ====== Zim ====== | ||
- | * {{ : | ||
- | * {{ : | ||
- | * {{ : | ||
- | * {{ : | ||
- | * {{ : | ||
- | * {{ : |
method_0_intro.1664031329.txt.gz · Last modified: by gman