43 lines
643 B
Markdown
43 lines
643 B
Markdown
|
# Methodology
|
||
|
|
||
|
* Steps
|
||
|
* Reconnaissance
|
||
|
* Enumeration/Scanning
|
||
|
* Gaining Access
|
||
|
* Privilege Escalation
|
||
|
* Covering Tracks
|
||
|
* Reporting
|
||
|
|
||
|
## Reconnaissance
|
||
|
* Duck / SearX / metacrawler / google
|
||
|
* Wikipedia
|
||
|
* [Shodan.io](http://www.shodan.io)
|
||
|
* PeopleFinder.com
|
||
|
* who.is
|
||
|
* sublist3r
|
||
|
* hunter.io
|
||
|
* builtwith.com
|
||
|
* wappalyzer
|
||
|
|
||
|
## Enumeration
|
||
|
* nmap
|
||
|
* nikto
|
||
|
* gobuster
|
||
|
* dirbuster
|
||
|
* metasploit
|
||
|
* enum4linux / linpeas / winpeas / linenum
|
||
|
|
||
|
## Exploitation
|
||
|
|
||
|
## Privilege Escalation
|
||
|
|
||
|
## Covering Tracks
|
||
|
|
||
|
## Reporting
|
||
|
* Includes
|
||
|
* Vulnerabilities
|
||
|
* Criticality
|
||
|
* Description
|
||
|
* Countermeasures
|
||
|
* Finding summary
|