Pentest Process - VascoLucas01/cybersecurity-reading-notes GitHub Wiki
The Penetration Testing Execution Standard (PTES), the most commonly used pentester methodoly, outlines seven stages of pentesting:
- Pre-engagement Interactions (Rules of Engagement)
- Intelligence Gathering (Understand the services, OS, machines, etc; passive and active gathering)
- Threat Modeling (Techniques)
- Vulnerability Analysis
- Exploitation (gain access)
- Post Exploitation (ransomware)
- Reporting
Some interesting tools:
- Theharvester (KALI)
- Nessus (Vulnerability scanner)