This video covers an example of a "Hacking" or "Penetration Testing" methodology. The high-level penetration testing methodology used in this video is Alpine Security's methodology:
PHASE 1 - PLANNING AND PREPARATION
1.1 Kick-Off Meeting
1.2 Explicit Test Authorization Document Review and Signature
1.3 Rules of Engagement Document Review and Signature
PHASE 2 - RECONNAISSANCE / DISCOVERY
2.1 Passive Reconnaissance
2.2 Active Reconnaissance
2.3 Prioritize Target List
PHASE 3 - VULNERABILITY ENUMERATION / ANALYSIS
3.1 Enumerate Target Vulnerabilities
3.2 Analyze Vulnerabilities
3.3 Map Vulnerabilities to Exploits
3.4 Prioritize Targets to Exploit
PHASE 4 - INITIAL EXPLOITATION
4.1 Compromise Targets
4.2 Gain Consistent Target Access
4.3 Use Compromised Targets for Additional Reconnaissance
PHASE 5 - EXPANDING FOOTHOLD / DEEPER PENETRATION
5.1 Escalate Privileges
5.2 Configure Pivot Point
5.3 Accomplish Objective
PHASE 6 – CLEANUP
6.1 Review Compromised Targets
6.2 Remove Files, Data, and Accounts Used for Exploitation
6.3 Verify System State is Pre-Test
PHASE 7 - REPORT GENERATION
7.1 Analyze Penetration Testing Documentation
7.2 Prioritize Findings
7.3 Write, Review, and Present Report
To schedule a penetration test contact us at:
https://alpinesecurity.com/services/p...
Alpine Security is now a wholly owned member of the CISO Global family of companies.
#cybersecurity #penetrationtesting #hackingmethodology
Watch video 7 Phase Penetration Testing Methodology online without registration, duration hours minute second in high quality. This video was added by user CISO Global 06 June 2020, don't forget to share it with your friends and acquaintances, it has been viewed on our site 1,447 once and liked it 39 people.