| description |
|---|
Penetration Testing Playbook |
Organizing resources such as notes, data, templates, schedules, communication channels, virtual machines, tools, accounts and customized tactics.
Passive information gathering about the target from openly available resources.
Active information gathering by flyover network scanning and then more detailed endpoint scanning, probing and exploration.
Using the results of recon and enumeration, attempt exploits against targets to obtain footholds.
Once successfully exploiting targets, seek to elevate access to hosts, networks, users and data via privilege escalation and persistence.
Remove exploits, persistence, tools and any other artifacts.
Summary, risks, impacts and remediation report.