Thursday, April 10, 2014

Kali Linux Penetration Testing concepts

RAC Concepts

Kali  Linux Penetration Testing concepts


Kali Linux is designed to follow the flow of a Penetration Testing service engagement. Regardless if the starting point is White, Black, or Gray box testing, there is a set of steps that should be followed when Penetration Testing a target with Kali or other tools.

  1. Step 1 – Reconnaissance
  2. Step 2 – Target evaluation
  3. Step 3 – Exploitation
  4. Step 4 – Privilege Escalation
  5. Step 5 – maintaining a foothold




No comments:

Post a Comment