The VX-Files
Search...
Ctrl
K
Cybersecurity Theory
Index
Pentesting methodology & Techniques
Last updated
1 year ago
📕
CIA Triad - Confidentiality, Integrity & Availability
The methodology steps
Pre-Engagement
Information Gathering
Vulnerability Assessment
Exploitation
Post-Exploitation & Persistence
Privilege Escalation & Lateral Movement
Reporting & Remediation