Basics
Basic Fundamentals of Networking and Pentesting
Last updated
Was this helpful?
Basic Fundamentals of Networking and Pentesting
Last updated
Was this helpful?
KeepNote:
CheryTree:
GreenShot:
FlameShot:
OneNote:
Joplin:
IPv4 / IPv6 -
Pentesting Methodology
1. Reconnaissance
2. Scanning | Enumeration
3. Vulnerability Assessment
4. Gaining Access | Exploitation
5. Maintaining Access | Post exploitation
6. Cleanup and Removing Evidence
7 Reporting
Mac Address -
OSI Model -
Subnetting