The gMan nixWiki

Because the mind is made of Teflon...

User Tools

Site Tools


method_0_intro

This is an old revision of the document!


Table of Contents

PenTest Methodology

During a PenTest you generally follow these six steps:

  1. Pre-Engagement: Planning & Scope
  2. Recon: Information Gathering
  3. Scanning
  4. Exploitation
  5. Post-Exploitation
  6. Post-Engagement: Report

Most important out of the six:

  1. Recon (info gathering)
  2. Scanning & Enumeration
  • If you do those two right and well, you should have no problem getting to where you need to go.
  • Therefore, if you are having problems getting to where you need to go, you probably missed something in your scanning and enumeration.

Enumeration: All enumeration means is “build a list.” You enumerate throughout this process, and it is essential for a successful hack.


Practice

VulnHub has a lot of practice machines you can download.

  • VulnHub machines are virtual machines (VMs) and are built for VMWare.
  • Debian 10 (Buster) runs VMWare Workstation fine. Debian 11 (Bullseye)… not so much.

List of VulHub machines similar to OSCP:


Zim

method_0_intro.1664031355.txt.gz · Last modified: by gman