PenTesting Methodology

PenTesting Methodology

Security Colony - Detail 2019-04-17 22-10-24.png

131759_248825951909978_1486760180_o

Identify Target Environment

  1. Wireless
  2. Web Application
  3. MITRE ATT&C – https://attack.mitre.org/wiki/Main_Page
  4. External Network Infrastructure
  5. Internal Network Infrastructure
  6. Database Infrastructure
  7. Social Engineering
  8. Physical Security
  9.  SCADA
  10. IoT
  11. https://www.faradaysec.com/#why-faraday
  12. 0

Reconnaissance

 

 

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s