method_0_intro
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
method_0_intro [2022/09/24 19:36] – [PenTest Methodology] gman | method_0_intro [2022/12/31 00:16] (current) – [Methodology Resources] gman | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== PenTest Methodology ====== | ====== PenTest Methodology ====== | ||
+ | |||
+ | ===== Six Stages ===== | ||
**During a PenTest you generally follow these six steps: ** | **During a PenTest you generally follow these six steps: ** | ||
Line 8: | Line 10: | ||
- Post-Exploitation | - Post-Exploitation | ||
- Post-Engagement: | - Post-Engagement: | ||
+ | |||
+ | ===== Essential ===== | ||
**Most important out of the six: ** | **Most important out of the six: ** | ||
Line 16: | Line 20: | ||
* Therefore, if you are having problems getting to where you need to go, you probably missed something in your scanning and enumeration. | * Therefore, if you are having problems getting to where you need to go, you probably missed something in your scanning and enumeration. | ||
- | **Enumeration:** All // | + | ===== Enumeration |
+ | |||
+ | All // | ||
+ | |||
+ | ===== Methodology Resources ===== | ||
+ | |||
+ | Here are some frameworks, methodologies, | ||
+ | |||
+ | - [[https:// | ||
+ | * The most comprehensive free database of hacking information (concepts and practices) available. | ||
+ | * It is not a pentesting standard or outline. It is a knowledge base of descriptions, | ||
+ | - [[https:// | ||
+ | * Provides pentesting guides for web security, mobile security, and firmware. | ||
+ | * Also provides advice on how to use other testing methodologies and standards. | ||
+ | - [[http:// | ||
+ | * One of the most complete modern and openly available pentesting standards. | ||
+ | * Includes pre-engagement interactions (scoping, questions for clients, details on dealing with third parties, etc.). | ||
+ | * Provides a full range of pentesting techniques and concepts. | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
---- | ---- | ||
====== Practice ====== | ====== Practice ====== | ||
+ | |||
+ | ===== VulnHub ===== | ||
VulnHub has a lot of practice machines you can download. | VulnHub has a lot of practice machines you can download. | ||
Line 28: | Line 54: | ||
List of VulHub machines similar to OSCP: | List of VulHub machines similar to OSCP: | ||
* [[https:// | * [[https:// | ||
+ | |||
+ | ===== TryHackMe ===== | ||
+ | |||
+ | Cyber security training through short, gamified, real-world labs. Content for complete beginners and seasoned hackers. | ||
+ | * [[https:// | ||
+ | * [[prac_app_tryhackme| Write-Ups]] | ||
+ | |||
+ | ===== Hack The Box ===== | ||
+ | |||
+ | A Massive Hacking Playground | ||
+ | * [[https:// | ||
+ | * [[prac_app_htb| Write-Ups]] | ||
---- | ---- | ||
method_0_intro.1664048160.txt.gz · Last modified: by gman