Skip to content

Latest commit

 

History

History
19 lines (11 loc) · 711 Bytes

File metadata and controls

19 lines (11 loc) · 711 Bytes

Methodology

https://coggle.it/diagram/XepDvoXedGCjPc1Y/t/enumeration-mindmap

Repeatable Step by Step Process

  • OSINT (if applicable)
  • Scan for open ports and research them to further enumerate the services
  • Enumerate the services as much as possible and write down anything potentially useful
  • Research potential vulnerabilities for found services
  • Exploit the target and create persistence
  • Loot the machine and move throughout the network if within scope

Resource for Methodology Development