Saturday 28 September 2013

Penetration testing methodology




Information gathering

Network mapping

Vulnerability identification


Penetration

Gaining access and escalation

Enumerating further

Compromising remote user/sites

Maintaining Access

Covering tracks

No comments:

Post a Comment