Essential Steps in Network Penetration Testing Methodology
- SapiensHack

- Sep 27, 2024
- 1 min read
Step #1 - Information Gathering
Passive Information
OSINT
Active Information Gathering
Network Mapping
Host Discovery
Port Scanning
Service Detection
OS Detection
Step #2 - Enumeration
Service Enumeration
OS Enumeration
User Enumeration
Share Enumeration
Step #3 - Exploitation (Initial Access)
Vulnerability Discovery
Vulnerability Analysis
Vulnerability Identification
Threat Modelling
Exploitation
Developing/ Modifying Exploits
Service Exploits
Step #4 - Post Exploitation
Local enumeration
Privilege Escalation
Credential Access
Defense Evasion
Lateral Movement
Step #5 - Reporting
Report Writing


Comments