method_0_intro
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
method_0_intro [2022/09/24 19:42] – [Enumeration] gman | method_0_intro [2022/12/31 00:16] (current) – [Methodology Resources] gman | ||
---|---|---|---|
Line 23: | Line 23: | ||
All // | All // | ||
+ | |||
+ | ===== Methodology Resources ===== | ||
+ | |||
+ | Here are some frameworks, methodologies, | ||
+ | |||
+ | - [[https:// | ||
+ | * The most comprehensive free database of hacking information (concepts and practices) available. | ||
+ | * It is not a pentesting standard or outline. It is a knowledge base of descriptions, | ||
+ | - [[https:// | ||
+ | * Provides pentesting guides for web security, mobile security, and firmware. | ||
+ | * Also provides advice on how to use other testing methodologies and standards. | ||
+ | - [[http:// | ||
+ | * One of the most complete modern and openly available pentesting standards. | ||
+ | * Includes pre-engagement interactions (scoping, questions for clients, details on dealing with third parties, etc.). | ||
+ | * Provides a full range of pentesting techniques and concepts. | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
+ | - [[https:// | ||
---- | ---- |
method_0_intro.1664048532.txt.gz · Last modified: by gman