🇷🇴 cristi
🇷🇴 cristi

@CristiVlad25

8 Tweets 2 reads Jan 01, 2023
The 7 Steps of an Effective Offensive Penetration Test:
1. Planning and scoping
2. Information gathering
3. Threat modelling
4. Vulnerability assessment
5. Exploitation
6. Post-exploitation
7. Reporting
(thread)
1. Planning and scoping
This involves defining the scope of the test, identifying the targets, and determining the objectives and criteria for success.
2. Information gathering
In this step, the pentester collects information about the target, such as its network architecture, technologies, and vulnerabilities.
3. Threat modeling
The pentester uses the information gathered to create a model of the potential attacks and vulnerabilities that could be exploited.
4. Vulnerability assessment
The pentester assesses the vulnerabilities from the threat modeling step.
5. Exploitation
The pentester attempts to exploit the identified vulnerabilities to gain access to the target systems or networks.
6. Post-exploitation
In this step, the pentester uses the access gained from the exploitation step to further compromise and/or maintain access within the target systems or networks.
7. Reporting
The report documents the findings of the pentest, including the vulnerabilities that were discovered and recommendations for improving the security of the system.
#ethicalhacking #cybersecurity #infosec #pentesting
Like, RT, and follow me @cristivlad25 for more.

Loading suggestions...