killchain-compendium/pentesting.md

43 lines
643 B
Markdown

# Methodology
* Steps
* Reconnaissance
* Enumeration/Scanning
* Gaining Access
* Privilege Escalation
* Covering Tracks
* Reporting
## Reconnaissance
* Duck / SearX / metacrawler / google
* Wikipedia
* [Shodan.io](http://www.shodan.io)
* PeopleFinder.com
* who.is
* sublist3r
* hunter.io
* builtwith.com
* wappalyzer
## Enumeration
* nmap
* nikto
* gobuster
* dirbuster
* metasploit
* enum4linux / linpeas / winpeas / linenum
## Exploitation
## Privilege Escalation
## Covering Tracks
## Reporting
* Includes
* Vulnerabilities
* Criticality
* Description
* Countermeasures
* Finding summary