Kali
Linux Penetration Testing concepts
Kali Linux is
designed to follow the flow of a Penetration Testing service engagement.
Regardless if the starting point is White, Black, or Gray box
testing, there is a set of
steps that should be followed when Penetration Testing a target with Kali or other
tools.
- Step 1 – Reconnaissance
- Step 2 – Target evaluation
- Step 3 – Exploitation
- Step
4 – Privilege Escalation
- Step 5 – maintaining a foothold
No comments:
Post a Comment