- 1 1Penetration Testing Methodology
- 1.1 1.1PHASE – I: PLANNING AND PREPARATION
- 1.2 1.2PHASE – II: ASSESSMENT
- 1.3 1.2.1Information Gathering
- 1.4 1.2.2Network Mapping
- 1.5 1.2.3Vulnerability Identification
- 1.6 1.2.4Penetration
- 1.7 1.2.5Gaining Access and Privilege Escalation
- 1.8 1.2.6Enumerating Further
- 1.9 1.2.7Compromise Remote Users/Sites
- 1.10 1.2.8Maintaining Access
- 1.11 1.2.9Cover the Tracks
- 1.12 Audit (optional)
- 1.13 1.3PHASE – III: REPORTING, CLEAN UP & DESTROY ARTIFACTS
- 1.14 1.3.1Reporting
- 1.15 1.3.1.1Verbal Reporting
- 1.16 1.3.1.2Final Reporting
- 1.17 1.3.2Clean Up and Destroy Artifacts
- Fonte
0 comentários:
Enviar um comentário