Penetration Testing Roadmap
Method:
Find a host to exploit;
Identify a running service on that host to exploit;
Find out the version of the service;
Find an exploit that works against that version (e.g. CVE);
Run the exploit;
Repeat as required.
High-Level Plan.
Reconnaissance and Information Gathering;
Network Enumeration and Scanning;
Vulnerability Testing and Exploitation;
Reporting.
Last updated