Show Menu
Cheatography

Pentest Cheat Sheet (DRAFT) by

pentest summary study

This is a draft cheat sheet. It is a work in progress and is not finished yet.

Pentesting Lifecycle

1. Defining the Scope
IP ranges, hosts, and applic­ations should be test
2. Inform­ation Gathering
Collect data about the target
3. Vulner­ability Detection
4. Initial Foothold
5. Privilege Escalation
6. Lateral Movement
7. Report­ing­/An­alysis
8. Lessons Learne­d/R­eme­diation

Inform­ation Gathering

Passive Inform­ation Gathering
Also knows as Open-s­ource Intell­igence (OSINT)
non or almost non direct intera­ction with that target
Whois Enumer­ation
 
Active Inform­ation Gathering