Penetration testing standard PTES

A. The early stages of interaction
    1. Verify penetration testing scope, objectives, constraints.
II. Intelligence gathering
    1. Obtain the target configuration information, scanning, social engineering.
III. Threat Modeling
    1. For access to information, threat modeling and attack planning.
IV. Vulnerability Analysis
    1. confirmed passage feasible attack.
V. penetration attacks
    1. The use of target vulnerabilities, a privilege escalation attack.
VI. After penetration
    1. The holding control of the object, is controlled using the target, the target tissue for further penetration.
VII. Test Report
    1. Submit test reports, obtain approval, get a reward.

Guess you like

Origin www.cnblogs.com/PrideAssassin/p/11462879.html