Pentesting Methodology

The Starting Point

Well Every pentest starts from somewhere. In this section we will walk through the pentesting methodology and create a mind map of how to progress in a pentest

Enumeration

The first and most important part of a pentest is enumeration, the more information you have about a target the better, things like services, ports OS Version and more can point you in the right direction of what to exploit and what is vulnerable. It forms the base of the exploitation stage

NMAP

Nmap is a great tool to begin a pentest with and has quickly become a staple, it scans a IP and provides details on what ports,services & OS the machine is running. You can read more about it in this section

Last updated