πŸ₯·
Red
search
⌘Ctrlk
πŸ₯·
Red
  • πŸŸ₯Overview
  • β­•Attacker Lifecycle
    • Steps
      • πŸ“°Pre-Engagement
      • Engagement
      • πŸ”¬Information Gathering
      • Pillaging
      • πŸ‘€Vulnerability Assessment
      • Exploitation
      • Post-Exploitation
      • Lateral Movement
      • Proof-of-Concept
      • Post-Engagement
  • πŸ“šEducation
  • Bug Bounty
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. β­•Attacker Lifecycle

Steps

These are the steps of a penetration test

πŸ“°Pre-Engagementchevron-rightEngagementchevron-rightπŸ”¬Information Gatheringchevron-rightPillagingchevron-rightπŸ‘€Vulnerability Assessmentchevron-rightExploitationchevron-rightPost-Exploitationchevron-rightLateral Movementchevron-rightProof-of-Conceptchevron-rightPost-Engagementchevron-right
PreviousOverviewchevron-leftNextPre-Engagementchevron-right

Last updated 16 days ago