O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

General penetration testing phases

A successful penetration attempt takes place in phases in order to understand or replicate the same need to understand the core competent phases of penetration testing.

The process can be broken down as follows:

  1. Gathering requirements
  2. Preparing and planning (phases, objectives, approvals)
  3. Assessing/detecting the devices and their vulnerabilities
  4. Actual attack
  5. Categorization/reporting of vulnerabilities
  6. Threat management/asset risk rating
  7. Reporting

Let's understand these processes in brief.

Gathering requirements

In this phase, we gather as much information as we can about our targets, such as identifying the IP address and the port details. Once this is done, more information can be gathered about the type of OS flavor ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required