🌺
tryhackme notes
  • 🌺TryHackMe Profile Link
  • Learning Paths
    • 🌺CompTIA PenTest+
      • 🍡Intro to Offensive Security
      • 🍡Penetration Testing Tools
        • 🍡Nmap
          • 🍡Nmap Switches
          • 🍡Overview
          • 🍡TCP Connect Scans
          • 🍡SYN Scans
          • 🍡UDP Scans
          • 🍡NULL, FIN, Xmas Scans
          • 🍡Working with the NSE
          • 🍡Practical
        • 🍡Burp Suite
          • 🍡Introduction
          • 🍡Site Map and Issue Definitions
        • 🍡Metasploit
          • 🍡Introduction
          • 🍡Working with Modules
        • 🍡Nessus
          • 🍡Introduction
          • 🍡Scanning!
          • 🍡Scanning a Web Application!
        • 🍡Hydra
          • 🍡Introduction
          • 🍡Using Hydra
      • 🍡Application-based Vulnerabilites
        • 🍡OWASP Top 10
          • 🍡[Severity 1] Command Injection
          • 🍡[Severity 2] Broken Authentication
          • 🍡[Severity 3] Sensitive Data Exposure
          • 🍡[Severity 4] XML External Entity
          • 🍡[Severity 5] Broken Access Control
          • 🍡[Severity 6] Security Misconfiguration
        • 🍡Vulnversity
      • 🍡Local-host Vulnerabilities
      • 🍡Network-based Vulnerabilites
    • 🌺Web Fundamentals
      • 🌺Introduction to Web Hacking
        • 🍡Walking an Application
      • 🌺Pickle Rick
  • Modules
    • 🌺Linux Fundamentals
      • 🍡Linux Fundamentals Part 1
        • 🍡Searching for Files
      • 🍡Linux Fundamentals Part 3
        • 🍡Processes 101
    • 🌺Introduction to Penetration Testing
      • 🍡Pentesting Fundamentals
        • 🍡Penetration Testing Methodologies
          • 🍡Black Box, White Box, Grey Box Penetration Testing
      • 🍡Principals of Security
        • 🍡The CIA Triad
        • 🍡Principles of Privilege
        • 🍡Security Models Continued
        • 🍡Threat Modelling & Incident Response
    • 🌺Introduction to Cyber Security
    • 🌺Pre Security
    • 🌺John the Ripper
  • Rooms
    • 🍡Basic Pentesting
    • 🍡OhSINT
    • 🌸Sakura Room
    • 😼dogcat
Powered by GitBook
On this page
  1. Modules
  2. Introduction to Penetration Testing
  3. Pentesting Fundamentals

Penetration Testing Methodologies

Pentration tests each have a different scope and goal.

Stages of Penetration Testing

Stage
Description

Information Gathering

Gathering as much publically accessible information as possible (OSINT and research)

Enumeration/Scanning

Discovering what services and applications are running on the system

Exploitation

Leveraging vulnerabilities that were discoverd on a system using either public exploits or exploiting application logic

Privilege Escalation

Excalating privileges horizontally (another account of the same privilege) or vertically (administrator accounts)

Post-Exploitation

Contains substages: Pivoting (what other hosts can be targeted), what additional information we can gather from the host, covering your tracks, reporting

OSSTMM (The Open Source Security Testing Methodology Manual) - provides a detailed framework of testing strategies and is the best for telecommunications, wired networks, wireless communications.

OWASP (Open Web Applicatoin Security Project) - framework used solely to test the security of web applications and services

PreviousPentesting FundamentalsNextBlack Box, White Box, Grey Box Penetration Testing

Last updated 2 years ago

🌺
🍡
🍡