Penetration testing simulates a real attack on your infrastructure. It finds vulnerabilities before an attacker does.
Methodology¶
- Reconnaissance — information gathering
- Scanning — identifying services and vulnerabilities
- Exploitation — attempting to exploit
- Post-exploitation — lateral movement
- Reporting — documenting findings
Reconnaissance¶
Passive recon¶
whois example.com dig example.com ANY subfinder -d example.com theHarvester -d example.com -b google
Active scanning¶
nmap -sV -sC -O -p- target.com nikto -h https://target.com
Tools¶
- Nmap: Port scanning, service detection
- Burp Suite: Web app testing
- Metasploit: Exploitation framework
- SQLMap: SQL injection automation
- Nuclei: Vulnerability scanning
Key Takeaway¶
Pentest regularly (at least once a year). Combine automated scanning with manual testing.
securitypentesthackingnmap