The gMan nixWiki

Because the mind is made of Teflon...

User Tools

Site Tools


method_0_intro

This is an old revision of the document!


Table of Contents

PenTest Methodology

During a PenTest you generally follow these six steps:

  1. Pre-Engagement: Planning & Scope
  2. Recon: Information Gathering
  3. Scanning
  4. Exploitation
  5. Post-Exploitation
  6. Post-Engagement: Report

Most important out of the six:

  1. Recon (info gathering)
  2. Scanning & Enumeration

If you do those two right and well, you should have no problem getting to where you need to go.

Therefore, if you are having problems getting to where you need to go, you probably missed something in your scanning and enumeration.

Enumeration: All enumeration means is “build a list.” You enumerate throughout this process, and it is essential for a successful hack.


Practice

VulnHub has a lot of practice machines you can download.

  • VulnHub machines are virtual machines (VMs) and are built for VMWare.
  • Debian 10 (Buster) runs VMWare Workstation fine. Debian 11 (Bullseye)… not so much.

List of VulHub machines similar to OSCP:


Zim

method_0_intro.1664031329.txt.gz · Last modified: by gman