There are seven steps:
- Pre-engagement Interactions
Discuss the goals, scope of tests and terms with customers.
- Intelligence Gathering
Gather any information about the target.
- Threat Modeling
Identify existing vulnerability of the target and decide the effective way to attack.
- Vulnerability Analysis
Understand what attacks might be viable by analyzing all information gathered.
- Exploitation
Exploit the identified possible target with suitable exploits.
- Post Exploitation
Determine what various systems do and their different user roles.
- Reporting
Report your findings to clients.
No comments:
Post a Comment