# Methodology * Steps * Reconnaissance * Enumeration/Scanning * Gaining Access * Privilege Escalation * Covering Tracks * Reporting ## Reconnaissance * Duck / SearX / metacrawler / google * Wikipedia * [Shodan.io](http://www.shodan.io) * PeopleFinder.com * who.is * sublist3r * hunter.io * builtwith.com * wappalyzer ## Enumeration * nmap * nikto * gobuster * dirbuster * metasploit * enum4linux / linpeas / winpeas / linenum ## Exploitation ## Privilege Escalation ## Covering Tracks ## Reporting * Includes * Vulnerabilities * Criticality * Description * Countermeasures * Finding summary