method_0_intro
This is an old revision of the document!
Five Stages of a Hack
You go through each of these five stages during ever pentest you do.
- Reconnaissance (active vs. passive)
- Active: Actually engage the target
- Passive: Googling, etc. (not directly against the target)
- Scanning & Enumeration (Nmpa, Nessus, Nikto, etc.)
- Exploitation (gaining access)
- Maintaining Access
- Covering Your Tracks (clean up what you did, create, broke, etc.)
Lather, rinse, repeat…
method_0_intro.1600999822.txt.gz · Last modified: by gman