Penetration Testing Roadmap

Method:

  • Find a host to exploit;

  • Identify a running service on that host to exploit;

  • Find out the version of the service;

  • Find an exploit that works against that version (e.g. CVE);

  • Run the exploit;

  • Repeat as required.

High-Level Plan.

  • Reconnaissance and Information Gathering;

  • Network Enumeration and Scanning;

  • Vulnerability Testing and Exploitation;

  • Reporting.

Last updated