How To Pen-Test Sytem [Based On Linux Server]

Bismillah...

The mentor said that "The important things in security testing or auditing is to follow the Hacking Phase orderly and completely".

Hasking Phase

First=>Information Gathering=>Service Enumeration=>Vulnerability Assessment=>Exploit=>Repeat till success. If so, then Second=>Backdooring=>Maintaining Access=>House Keeping=>End.

In this article I'm gonna share (The Pyramid) step plainly


Comments

Populer Post

Extract Database With Sqlmap

How To Install Mutillidae And Try A Little Test